A. Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data.
B. Ensure that relevant access to key applications is strictly controlled through an approval and review process
C. Institute detection and authentication controls for all devices used for network connectivity and data storage
D. Use management software to scan and then prompt patch reminders when devices connect to the network