1. Deploying access management system to manage, monitor users. 2. Using Privileged Access Management for administrative access to systems. 3. Implementing multifactor authentication. 4. Applying appropriate policies — strong password-protected encryption, certificate access to network settings 5. Deploying MDM platforms to monitor employees’ mobile devices, networks.6. Implement BYOD only when it can be effectively controlled.