Question: Discuss a guidance for managers to use when discussing security requirements for remote work with their subordinates. Please address security practices which remote workers should
Discuss a guidance for managers to use when discussing security requirements for remote work with their subordinates.
Please address security practices which remote workers should be required to follow and technologies which they should use to protect the integrity of information and systems which they access remotely. These practices could include: using anti-virus applications, virtual private networks, restrictions on applications downloaded to mobile devices, use of mobile device management apps, remote wipe for lost devices, etc. Use information and security control families.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
