CIS 542 w9

“Endpoint Communications” Please respond to the following:

  • Describe how you can assess the security of your endpoint communications devices.  Specific to these types of devices, describe the effect of bring-your-own-device (BYOD) to organizations.
  • Once you have assessed the security of your endpoint devices, discuss some of the best practices you would take to secure your endpoint communications devices and ensure they remain secure.