Friday, July 19, 2013

Mobile device security


What project is not running these days with some number of mobile devices? In fact, the question may be put the other way around -- what projects are running with laptops or desktops? Likely the answer to this is "all of the above"

With that in mind, you might be interested in this blurb from the NIST:

The National Institute of Standards and Technology (NIST) has published a mobile device management guide...
Employees want to be connected to work through mobile devices for flexibility and efficiency, and managers can appreciate that. However, the technology that delivers these advantages also provides challenges ... because these devices can be more vulnerable.
...
Guidelines for Managing the Security of Mobile Devices in the Enterprise helps ... organizations struggling with this dilemma.
The revised guidelines recommend using centralized device management at the organization level to secure both .. issued and individually owned devices used for ... business.
...
Other key recommendations include instituting a mobile device security policy, implementing and testing a prototype of the mobile device solution before putting it into production, securing each organization-issued mobile device before allowing a user to access it, and maintaining mobile device security.

Check out these books I've written in the library at Square Peg Consulting