Last Updated on December 22, 2021 by Admin
An information security manager is implementing a bring your own device (BYOD) program. Which of the following would BEST ensure that users adhere to the security standards?
- Monitor user activities on the network
- Publish the standards on the intranet landing page
- Establish an acceptable use policy
- Deploy a device management solution