https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-46r2.pdf
This publication provides recommendations for securing BYOD devices used for telework and remote access as well as those directly attached to the enterprise's
References are divided into three categories (a) BYOD security considerations. (b) BYOD and employee relations
and best practices. There is a spectrum of ways to approach BYOD security in a health care setting but the objective is to make it easy for clinicians to
While the use of BYOD as well as Mobile Device Management (MDM) systems (often used to facilitate. BYOD deployments) introduces security considerations to the
18 mars 2021 compromise and permit efficient user notification. ? leverage industry best practices to enhance mobile device security and privacy ...
two key BYOD security issues: security challenges and available frameworks. [20] Hormazd Romer A (2014) Best practices for BYOD security. Computer.
White Paper Best Practices to Make BYOD CYOD and COPE Simple and Secure. Citrix.com. Mobile productivity for your business. Freedom of choice for employees
reviews existing BYOD security approaches such as frameworks