If an organization permits its employees to use personally-owned computers for remote access, how are security and vulnerability management affected

Respuesta :

Explanation:

In this case, it would be risky for a company to allow the use of personal computers for remote access to organizational systems that contain data and information that must be protected by information security, which includes the confidentiality, integrity and availability of information.

In this case, the vulnerability management would be reduced, since each different remote computer may present weaknesses in the pillars of information security that significantly compromise security and induce attacks, failures and exposure of essential information to a company's business, the which can negatively interfere in business and cause a lot of damage to a company.