List of questions
Related questions
Question 530 - 312-50v12 discussion
You are a cybersecurity consultant for a global organization. The organization has adopted a Bring Your Own Device (BYOD)policy, but they have recently experienced a phishing incident where an employee's device was compromised. In the investigation, you discovered that the phishing attack occurred through a third-party email app that the employee had installed. Given the need to balance security and user autonomy under the BYOD policy, how should the organization mitigate the risk of such incidents? Moreover, consider a measure that would prevent similar attacks without overly restricting the use of personal devices.
A.
Provide employees with corporate-owned devices for work-related tasks.
B.
Implement a mobile device management solution that restricts the installation of non-approved applications.
C.
Require all employee devices to use a company-provided VPN for internet access.
D.
Conduct regular cybersecurity awareness training, focusing on phishing attacks.
Your answer:
0 comments
Sorted by
Leave a comment first