Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?

Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?

Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?

A.
The cell phone should require a password after a set period of inactivity.

B.
The cell phone should only be used for company related emails.

C.
The cell phone data should be encrypted according to NIST standards.

D.
The cell phone should have data connection abilities disabled.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


ABtech

ABtech

(answer C) I am leaning this way…..Making good on a promise to review cryptographic standards development process and subject it to public comment, the National Institute of Standards and Technology released Wednesday proposed internal guidance that would bind it to being transparent & open