NOT FOR REPRINT
Page Printed from: propertycasualty360.com/author/profile/dror-liwer/
Sign In To follow
The rise of the remote worker and the increased popularity of Bring Your Own Device (BYOD) policies have unintentionally propagated network risks.
{ "author": { "name": "Dror Liwer", "webUrl": "/author/profile/dror-liwer/", "description": "", "imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g", "estimate": 1, "social": [], "articles": [ { "uri": "/2018/11/27/the-7-most-common-network-vulnerabilities/", "title": "The 7 most common network vulnerabilities", "byline": "Dror Liwer", "kicker": "Commentary", "prettyDate": "November 27, 2018", "timeToRead": "1 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2018/11/Computer-Farm-Shutterstock.jpg", "width": "616", "height": "372" }, "authors": [ { "webUrl": "/author/profile/dror-liwer/", "name": "Dror Liwer" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "summary": "The rise of the remote worker and the increased popularity of Bring Your Own Device (BYOD) policies have unintentionally propagated network risks.", "body": null } ] } }