header bg

Scan QR code or get instant email to install app

Question:

James is employed by a company that recently experienced a data breach as a result of a stolen company cell phone. To prevent similar incidents from occurring in the future, he is exploring different mitigation techniques. Which of the following methods would be the most efficient in achieving this goal?

A Enable FDE via MDM.
explanation

Several configuration modifications could be implemented to help, such as enforcing passcodes, enabling full-disk encryption (FDE) on mobile devices using organizationally deployed mobile device management (MDM), and restricting access to sensitive files on these devices. On the other hand, firewall rules, data loss prevention (DLP) rules, and URL filters cannot prevent a stolen device from being accessed and sensitive data from being compromised.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*