Introduction to Securing Your Devices ( < 1 minute read)

Article author
Betty Fleming
  • Updated

Most campaigns and many organizations allow staff and volunteers to bring or use their own devices for work. Bring Your Own Device (BYOD) saves money and allows staff and volunteers to use the tech they know the best.

Bad actors look to compromise devices--phones, laptops, tablets--to steal data and launch attacks on others. Using available security settings and software updates are critical to securing devices.

Learn more:

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment.