News & Analysis as of

Multi-Factor Authentication Mobile Devices Bring Your Own Device (BYOD)

Parker Poe Adams & Bernstein LLP

Can Employees Refuse to Use Personal Smartphones for Work Tasks?

Recently, we had interesting questions from a client that was implementing two-factor authentication for employees to access the company’s information systems. The process requires employees to install the authentication app...more

K2 Integrity

Cybersecurity Awareness Month: Installing Updates to Fix Bugs and Vulnerabilities

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online. It is an opportunity to focus on four key behaviors...more

ArentFox Schiff

Bring Your Own Device Policies: A Strategic Guide for Regulated Industries

ArentFox Schiff on

In the era of technology-driven workplaces, Bring Your Own Device (BYOD) policies have emerged as a significant trend. A BYOD policy allows employees to use their personal devices, such as smartphones, for work purposes,...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide