New Training: Plan for Device and Apps
| new skills - Team Nuggets

New Training: Plan for Device and Apps

In this 7-video skill, CBT Nuggets trainer John Munjoma covers the factors of planning and managing devices and apps with Microsoft. Watch this new Microsoft 365 training.

Learn Microsoft 365 with one of these courses:

This training includes:

  • 7 videos
  • 45 minutes of training

You’ll learn these topics in this skill:

  • Configuring Microsoft Store for Business
  • Assigning Applications to Users and Groups
  • Planning App Deployment
  • Device Co-Management and Monitoring
  • Plan for Device Profiles
  • Planning For Mobile Application Management
  • Mobile Device Security

Unique Considerations in Mobile Device Security

All IT assets must be secured, but the first level of good cybersecurity with traditional IT components is physical security. Mobile devices throw a wrench into this from the very beginning, and securing devices that can go virtually anywhere requires a different mindset and approach.

Another complicating factor is monitoring and governing employee use. While some of this concern revolves around ensuring that assets are used appropriately (smartphones weren't issued to help employees earn top scores in Candy Crush), the ability to modify a phone's system by installing new apps is something that must be carefully considered. Unauthorized apps, even when installed for appropriate business use, could introduce security breaches and compromise proprietary or restricted information.

Unsecure Wi-Fi is an additional concern. Mobile devices often encounter networks that aren't secured, many of which could be easily compromised. Giving employees the flexibility to access Wi-Fi when needed is critical, but ensuring that this doesn't compromise the data on the mobile device is just as crucial.

These and other unique considerations require that mobile device security be characterized by an intentional, systematic approach that incorporates established best practices.

Download

Download

Ultimate Security Cert Guide

A 62-page guide to every Palo Alto, Offensive Security, (ISC)2, Check Point, CompTIA, and Cisco certification, and how they fit into your career.

I have read and understood the privacy policy, and am able to consent to it.