Question: End-user devices enable the interface between customers and products. The types of end-user devices that employees use at my current employer are desktop computers and
End-user devices enable the interface between customers and products. The types of end-user devices that employees use at my current employer are desktop computers and laptops. Most of our employees use desktop PCs to perform their daily tasks. The organization's first level of security would be requiring employees to lock their computers when they're going to be away from their desks. Requiring employees to enter "control, alt, delete" before walking away ensures no one can access the computer to obtain valuable or sensitive information or data. Additionally, my organization has changed its IT infrastructure, policies, and procedures to account for the variety of end-user devices by adding a two-factor authenticator (2FA) process to access a service or system. The first factor is the user entering their unique username and password. The second factor is when the system sends a unique verification code to our phones or authenticator app (we were all required to download the app). We then enter the code into the mobile app and are allowed access to the service or system. Other examples of 2FA are SMS codes, Biometrics, and Security keys
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
