This process involves removing the security restrictions of a device, often a mobile phone. This then allows the owner to install unofficial apps and make modifications to the system.
Sign up for your free trial today and get hands on with all the compliance features that ISMS.online has to offer
Find out more