Sara, an employee, tethers her smartphone to her work PC to bypass the corporate web security gateway while
connected to the LAN. While Sara is out at lunch her PC is compromised via the tethered connection and
corporate data is stolen. Which of the following would BEST prevent this from occurring again?
Disable the wireless access and implement strict router ACLs.
Reduce restrictions on the corporate web security gateway.
Security policy and threat awareness training.
Perform user rights and permissions reviews.
BYOD (In this case Sara’s smart phone) involves the possibility of a personal device that is infected with
malware introducing that malware to the network and security awareness training will address the issue of the
company’s security policy with regard to BYOD.