top of page
HOffice ProServ
Merging cybersecurity best practices with today's flexible home office staff
Endpoint Security: Personally-owned Devices
Easily the most advantageous aspect of an environment where access, processing, storage, and communications of business and business-related information is restricted to use corporate-owned devices is that those devices are directly and immediately subject to organizational policies and actions. This includes, but is not limited to, deployment of hardened baseline configurations, control and monitoring of activity, and even remote wipe. Although the information provided below is not all encompassing, they are some important things that should be considered for each of your endpoint devices:
Hardened Baseline Configurations & Validation
​
​
Remote Access
​
​
Baseline Configuration and Validation
TBD
​
Secure Storage and Transmission
TBD
​
Recuperation of Assets
TBD
​
bottom of page