Deploying Mobile Devices Securely – Part 1

0
218
views

As we all know, mobile devices have not only become an integral part of the workplace, but even in society.

Therefore, the safe deployment of these devices is paramount not just for individuals, but businesses and corporations, government agencies, as well as other entities.

For example:

> Mobile devices have indeed become an integral part of any corporate network, as many employees these days now log in from their smartphone to access shared files and other types of resources.

> In fact, mobile devices have become the prime target for the cyber attacker today. Thus, an understanding of the risks and threats that are out there and how to combat them in a proactive fashion is a must.

> In some industries, such as healthcare, employees use their smartphone to access confidential patient information. With that comes the need to understand the federal laws surrounding the protection of this data is very important, especially when it comes to HIPAA.

How to Secure Mobile Devices in Your Environment

1. You must formulate and implement a Mobile Device Security policy:

This should be a part of the overall security policy of any business or corporation, and should include the following elements:

> The specific types of resources that can be accessed via a mobile device;

> The degree to which mobile devices can be used to remotely access these resources;

> How Mobile Device Management software should be installed and configured not only in the devices themselves, but also on the servers that are synced up with them.

> How firmware and software upgrades / patches should be installed on the mobile devices, and the frequency for checking these upgrades on the wireless vendor’s websites.

2. Create a cyber threat model landscape for your specific mobile device environment:

By designing such a model, your organization will have a much better understanding of the threat landscape from a visual perspective.

This is especially true when respective weights (of importance) are assigned to each kind of associated threat.

Thus, you will not only be able to ascertain the security requirements for your mobile devices in an expedient fashion, but also the controls that are needed in order to safeguard them.

This could be from employee misuse or employee negligence (deemed to be the weakest link in the proverbial security chain).

More to Come…

In one of our future posts we’ll continue with the theme on how to secure the mobile devices.

This is with regard not only to your work environment, but to those that you give out to your employees as well – for them to conduct their every day work functions.


 

Facebook Comments

LEAVE A REPLY

Please enter your comment!
Please enter your name here