Mobile-proofing your network
Source: SearchSecurity - Posted by Pax Dickinson   
Wireless Security A stolen laptop made public last week by the University of California, Berkeley contained unencrypted personal data on nearly 100,000 graduate students and applicants and is just the latest case to underscore the need for increased protection of personal information.

"Since mobile devices are subject to all sorts of threats including both technological [viruses, worms, spam] and physical [lost or stolen], it is essential that organizations that allow the use of these instruments devise corporate policies regarding their use and further document courses of action if exposed to these kind of threats," said Dave Wreski, CEO of Guardian Digital in Allendale, N.J. Wreski believes that the policies and procedures should include the following:

  • Utilize advanced encryption and security standards, including Wired Equivalent Privacy (WEP) to minimize the occurrence of WLAN-related vulnerabilities;
  • Password-protect all mobile devices;
  • Encrypt sensitive documents that are stored on the device;
  • Minimize access to sensitive internal information by using firewalls;
  • Back-up data regularly on all mobile devices; and
  • Implement antivirus software on all mobile devices.

Read this full article at SearchSecurity

Only registered users can write comments.
Please login or register.

Powered by AkoComment!