cism video for an enterprise promotes the use of personal devices for office communication, facilitating ease of access to corporate emails. The challenge for
An enterprise promotes the use of personal devices for office communication, facilitating ease of access to corporate emails. The challenge for the information security manager is ensuring that these devices do not become conduits for data breaches. What strategy would be MOST effective in curtailing this potential risk?