CIS 542 w9
“Endpoint Communications” Please respond to the following:
- Describe how you can assess the security of your endpoint communications devices. Specific to these types of devices, describe the effect of bring-your-own-device (BYOD) to organizations.
- Once you have assessed the security of your endpoint devices, discuss some of the best practices you would take to secure your endpoint communications devices and ensure they remain secure.