HOffice ProServ
Merging cybersecurity best practices with today's flexible home office staff
Endpoint systems are those gateway and productivity devices between the tangible user and intangible data. It is important to remember that at the core of data integrity, confidentiality, and availability is the non-technical piece - the human. When working with technical devices, we find that there are three general things that the user wants from their device:
​
​
Merging these desires into an effective and acceptable security program can prove difficult but can be managed... for the most part (remember that you can't please all of the people all of the time). In the search for facilitating end user comfort and their ability to properly handle business data, companies have two different options when it comes to end user devices: Corporate-owned and bring-your-own-devices (BYOD).
BYOD
Corporate
Devices owned by individuals used to access, store, process, and transmit business and business related data
Devices that are purchased by the business and issued for business use.
Endpoint Security: Merging HOffice Equipment & Business
The objective of this section is to identify baseline controls and considerations that can be applied to both types of devices. Remember that at the forefront of the listed controls is protection of business data and that the cost of end devices pale in comparison to the data that drives the business. Traditionally, corporate-owned devices are stringently controlled both physically and logically; however, as lines become more flexible, corporate use finds itself working alongside personal use.