Device Management

Using peripherals securely
Advice for IT system administrators on the secure management of peripherals for smartphones, tablets, laptops and desktop PCs Most modern mobile devic...
Using built-in cloud services
Secure use of built-in cloud services on smartphones, tablets, laptops and desktop PCs. Most modern devices and browsers are able to sync user data an...
Logging and protective monitoring
Using logging and monitoring to identify threats and protect smartphones, tablets, laptops and desktop PCs Security monitoring is central to the ident...
Device Management
Device management is the process of managing the implementation, operation and maintenance of a physical and/or virtual device. It is a broad term tha...
Choosing mobile devices
When choosing laptops, mobile phones and tablets for use by your organization, there will be many competing factors to consider. Price, functionality ...
Purchasing devices
Managing supply chain security when buying smartphones, tablets, laptops and desktop PCs There are many sourcing options available to organizations wh...
Provisioning and distributing devices
Advice for IT administrators on how to provision and distribute smartphones, tablets and laptops to end users Provisioning new devices and distributin...
Zero-touch enrollment
Using zero-touch enrollment to automatically provision smartphones, tablets and laptops Zero-touch automates much of the manual work involved in tradi...
Mobile Device Management
Advice on the selection and implementation of Mobile Device Management within your enterprise A Mobile Device Management (MDM) service combines device...
Using biometrics
Advice for IT system administrators on using biometric authentication on smartphones, tablets, laptops and desktop PCs. Biometrics are biological char...
Antivirus and other security software
Advice on the selection, configuration and use of antivirus and other security software on smartphones, tablets, laptops and desktop PCs Antivirus (AV...
Managing web browser security
Advice for IT Admins on the management of security settings for web browsers BCSF is focused on providing high-level guidance will help you develop an...
Using third-party applications
Advice on the assessment, distribution and use of third-party applications on smartphones, tablets, laptops and desktop PCs All modern mobile devices ...
Enterprise instant messaging
Advice on assessing the security features of enterprise instant messaging systems for smartphones, tablets, laptops and desktop PCs Enterprise Instant...
Erasing mobile devices
Advice for IT admins and individuals on the secure removal of data or malware from smartphones, tablets, laptops and desktop PCs Very often an organiz...
Keeping devices and software up to date
Advice for individuals and organizations on keeping software on smartphones, tablets, laptops and desktop PCs up to date. Modern mobile devices run a ...
Managing mobile device firmware
Advice for IT system administrators on firmware management for smartphones, tablets, laptops and desktop PCs All modern mobile devices include firmwar...
Advising end users
Advising your organization’s users on expected and acceptable uses of smartphones, tablets, laptops and desktop PCs Once devices have been provision...
Obsolete products
Reducing the risks from using out of date smartphones, tablets, laptops, desktop PCs, appliances or software applications. All software, including dev...
Enterprise authentication policy
Implementing effective authentication on smartphones, tablets, laptops and desktop PCs Authentication is the process of verifying the identity of eith...
Virtual Private Networks (VPNs)
Choosing, deploying and configuring VPN technologies Virtual Private Networks (VPNs) allow organizations to provide secure connectivity between device...
Network architectures
Advice for network architects and systems administrators on the design of remote access architecture for enterprise services When deciding how to enab...
Reset and reprovision - iOS devices
Discover the ways in which organizations can restore iOS devices from a misconfigured or potentially compromised state to a known-good state. The meth...
BYOD Agreement
I am seeking connectivity to ORGANIZATION (from here referred to as the Company) electronic messaging (email) services for my personally-owned smart...
Reset and reprovision - Windows devices
Discover the ways in which organizations can restore Windows devices from a misconfigured or potentially compromised state to a known-good state. This...
Reset and reprovision - Android devices
Discover the ways in which organizations can restore Android devices from a misconfigured or potentially compromised state to a known-good state. The ...
Securing Devices - Securing iOS
iOS and iPadOS Secure configuration and use of iOS and iPadOS devices iOS is the operating system which powers the iPhone and iPod Touch. iPadOS is a ...
Securing Devices - Securing macOS
Secure configuration of macOS devices macOS is the default operating system on Apple’s Mac, iMac, and Macbook devices. While this guide does not apply...
Securing Devices - Securing Windows 10
Security guidance for organizations on the secure configuration of Windows 10. While this guide does not apply to any specific version of Windows, it ...
BYOD/Personal Device Agreement Sample
Personal Smart Device Usage Agreement (BYOD - Bring Your Own Device) BCSF recommends that organizations restrict BYOD access to mobile phones only. Pe...
Bring Your Own Device (BYOD) Guidance
Guidance for personal devices in organization environments. Guidance for companies on enabling staff to use their own smartphones, tablets, laptops an...