Page 70 - index
P. 70







http://blogs.cisco.com/security/byod-many-call-it-bring-your-own-malware-byom

How Secure is Your BYOD Environment | BYOD Security: 5 Risk Prevention Strategies |
smallbusiness.foxbusiness.com
http://smallbusiness.foxbusiness.com/technology-web/2014/08/07/byod-security-5-risk-
prevention-strategies/



About the Author


Giorgio Bonuccelli is the Marketing and Communication Director for 2X Software. Giorgio has
extensive experience in cloud computing and virtualization, with a background of many years in
multinational corporations (Dell, EMC and McAfee). In his career he has filled different roles,
from sales to training and marketing. This wide-ranging experience and flexibility helps him
simplify concepts and write content that is easy to read and understand even by newcomers to
the subject. As a blogger and technical writer he has published more than 1000 papers.



































70 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   65   66   67   68   69   70   71   72   73   74   75