This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
wiki:policies:end_user_device [2024/01/25 23:38] katcow |
wiki:policies:end_user_device [2024/08/11 18:38] (current) katcow |
||
---|---|---|---|
Line 29: | Line 29: | ||
==== Software Review ==== | ==== Software Review ==== | ||
- | Nested Knowledge reviews the applications installed on employee devices on a quarterly basis using our Mobile Device | + | Nested Knowledge reviews the applications installed on employee devices on a quarterly basis using our Mobile Device |
===== IV. Anti-Malware Policy ===== | ===== IV. Anti-Malware Policy ===== | ||
Line 47: | Line 47: | ||
- The offending applications and files will be uninstalled or removed until the report returns zero results. | - The offending applications and files will be uninstalled or removed until the report returns zero results. | ||
- The incident response team will analyze the malware attack surface and inventory the information that was available on the infected device since last scan. | - The incident response team will analyze the malware attack surface and inventory the information that was available on the infected device since last scan. | ||
- | - Based on the information available on the infected device, the appropriate Incident Response and Data Protection procedures will be enacted. Information about the threat will be escalated to clients/ | + | - Based on the information available on the infected device, the appropriate Incident Response and Data Protection procedures will be enacted. Information about the threat will be escalated to clients/ |
===== Enforcement ===== | ===== Enforcement ===== |