A security engineer investigates an incident and determines that a rogue device is on the network. Further investigation finds that an employee's personal device has been set up to access company resources and does not comply with standard security controls. Which of the following should the security engineer recommend to reduce the risk of future reoccurrence?
Steel16
1 week, 4 days agogrelaman
5 months, 1 week agoServerBrain
7 months, 2 weeks ago