SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Tech & Trends                                                               Click To Print
General Information
September 24, 2010 • Vol.32 Issue 20
Page(s) 41 in print issue


Analyze The Threat From Mobile
Devices
Protect Devices With Security Policies, Plans For Information
Recovery

                                    Among the greatest workplace changes taking place
   Key Points                       within the past decade or so is the amount of enterprise
                                    information leaving the office along with employee
   • With increased use of
   mobile devices comes the
                                    laptops and smartphones. Even one decade ago,
   need for a mobile device         employees seldom worked from home or while on the
   security policy.                 road, and they certainly didn’t tote small computers
                                    everywhere, says Stephen Midgley, vice president of
   • Thieves now realize the        global marketing at software security maker Absolute
   importance of information
   stored on mobile devices
                                    Software. With the explosive growth of enterprise-
   and are specifically targeting   issued mobile devices comes the threat of theft and the
   them.                            access by outsiders to the information on them, he says.

   • Software installed at the      To add another wrinkle, attackers now understand the
   enterprise level is capable of
   tracking lost devices and of
                                    value of the enterprise information stored on mobile
   wiping them clean of             devices and are specifically targeting them, be-cause
   sensitive enterprise             they’re so widely used, says Hugh Thompson, program
   information.                     committee chair for the RSA Conference, an annual IT
                                    security conference.

 Because the enterprise information value can far outweigh the value of the device itself,
 experts recommend IT managers have a plan for mobile device use by employees and for
 information recovery in the event of theft.

 “When organizations are allowing users to connect their devices to the network and
 download confidential business data--whether that’s internal information or customer
 data--you need a security policy that states how the devices should be encrypted,” says
 Matt Bossom, the program manager for technology solutions at IT security company
 ”Accuvant (www.accuvant.com).

   Policy In Place
The enterprise will need to budget for mobile device security, Midgley of Absolute
Software (www.absolute.com) says, because the IT department will need authentication
tools and likely special software to track a device and wipe its hardware in the event of
loss.

Bossom recommends IT managers take authentication steps beyond the authentication
available with the device out-of-the-box. Many mobile device platforms for use at the
enterprise level include stronger authentication than the authentication installed within the
device itself, he adds.

“The same authentication policy can be used for all different types of devices and can be
pushed out across the network,” Bossom says. “This is the same way Windows Server
pushes out updates using group policy.”

This type of authentication means employees will have to enter a password every time
they access the device. IT managers must ensure passwords aren’t easy for thieves to
guess (“no one, two, three, four” says Bossom) and that employees haven’t taped the
passwords to the device itself or placed it somewhere within their laptop bag, says Philip
Farina chief executive officer of Farina and Associates, Ltd. (www.farina-
associates.com), a security and risk consultancy for the hospitality industry.

Sure it’s a hassle for employees to enter a password each time they check their phones for
new emails, but doing so reminds them they’re using a workplace-issued device that
includes confidential information, he adds.

Of course an enterprise mobile device security policy will need to set out rules for use that
may seem almost common sense, but having them in writing helps, Farina adds. He
recommends IT managers warn employees against leaving their device in sight on a
restaurant table or bar--employees should carry it in their purse, pocket, or a carrying case
they have beside them at all times. When staying in a hotel room, lock the device in the
safe or lockbox when not in use.

To that end, ask employees to call ahead to ensure their hotel room will be equipped with
a lockbox and that they select only hotels that include the feature, he says.

They should also ask employees to keep the devices to themselves, the RSA Conference’s
Thompson adds. “You have to take into account [the] social and free nature with which
people pass these things around,” he says. “If it’s a work laptop, they might not let
someone use it for a second to look something up, but with a smartphone, they’d be more
inclined to hand it over to let someone call up a map or something.”

  In Case Of Theft

An enterprise’s mobile-device security policy should also outline the steps employees
must take should their device go missing. “Usually that means contacting a response
center or the IT department or someone else in corporate so the phone can get shut down
ASAP,” Farina says.
The policy will also likely call for the IT department to install device protection on
    laptops and run software capable of remotely wiping information from stolen laptops,
    Absolute Software’s Midgley says. The tracking software relies on technology embedded
    within the chips produced by most major chip vendors, he adds.

    When a laptop is lost or stolen, the software syncs with the device’s chip--which includes
    GPS capabilities--when the device is connected to the Internet. This allows law
    enforcement to track and seize the device. The tracking software can also wipe the device
    remotely to remove all confidential business information, Midgley says. Such tracking
    capabilities are also available for smartphones, he adds.

    Policies needn’t be overly restrictive, Farina says. Mostly, they just outline good,
    common-sense rules for device use--coupled with specific hardware and software IT
    departments should use to safeguard sensitive enterprise information.

    by Jean Thilmany




           Overseas Travel
           Here’s one unexpected tip for overseas travelers. Leave your enterprise-
           issued mobile device at home. Or bring a second laptop or smartphone that
           contains minimal enterprise information, says Philip Farina, chief
           executive officer of Farina and Associates, Ltd. (www.farina-
           associates.com), a security and risk consultancy for the hospitality
           industry. The risk of theft is just too high overseas, especially in some
           countries where thieves specifically target Western business travelers.




                     Copyright © 2010 Sandhills Publishing Company U.S.A. All rights reserved.

 

Weitere ähnliche Inhalte

Andere mochten auch

Designing and Testing for Digital Accessibility
Designing and Testing for Digital AccessibilityDesigning and Testing for Digital Accessibility
Designing and Testing for Digital AccessibilityUsability Matters
 
User Testing for Accessibility
User Testing for AccessibilityUser Testing for Accessibility
User Testing for AccessibilityUsability Matters
 
Workshop: Usability Testing for Accessibility
Workshop: Usability Testing for AccessibilityWorkshop: Usability Testing for Accessibility
Workshop: Usability Testing for AccessibilityUsability Matters
 
Planning, Conducting, and Analyzing User Research
Planning, Conducting, and Analyzing User ResearchPlanning, Conducting, and Analyzing User Research
Planning, Conducting, and Analyzing User ResearchUsability Matters
 
Conducting Successful Certification Review Programs
Conducting Successful Certification Review ProgramsConducting Successful Certification Review Programs
Conducting Successful Certification Review Programspfarina
 
Hospitality Security and Safety Solutions
Hospitality Security and Safety SolutionsHospitality Security and Safety Solutions
Hospitality Security and Safety Solutionspfarina
 
Putting Users in UX: Research Methods for Design
Putting Users in UX: Research Methods for DesignPutting Users in UX: Research Methods for Design
Putting Users in UX: Research Methods for DesignUsability Matters
 
Putting Users in UX: Research Methods for Strategy
Putting Users in UX: Research Methods for StrategyPutting Users in UX: Research Methods for Strategy
Putting Users in UX: Research Methods for StrategyUsability Matters
 

Andere mochten auch (8)

Designing and Testing for Digital Accessibility
Designing and Testing for Digital AccessibilityDesigning and Testing for Digital Accessibility
Designing and Testing for Digital Accessibility
 
User Testing for Accessibility
User Testing for AccessibilityUser Testing for Accessibility
User Testing for Accessibility
 
Workshop: Usability Testing for Accessibility
Workshop: Usability Testing for AccessibilityWorkshop: Usability Testing for Accessibility
Workshop: Usability Testing for Accessibility
 
Planning, Conducting, and Analyzing User Research
Planning, Conducting, and Analyzing User ResearchPlanning, Conducting, and Analyzing User Research
Planning, Conducting, and Analyzing User Research
 
Conducting Successful Certification Review Programs
Conducting Successful Certification Review ProgramsConducting Successful Certification Review Programs
Conducting Successful Certification Review Programs
 
Hospitality Security and Safety Solutions
Hospitality Security and Safety SolutionsHospitality Security and Safety Solutions
Hospitality Security and Safety Solutions
 
Putting Users in UX: Research Methods for Design
Putting Users in UX: Research Methods for DesignPutting Users in UX: Research Methods for Design
Putting Users in UX: Research Methods for Design
 
Putting Users in UX: Research Methods for Strategy
Putting Users in UX: Research Methods for StrategyPutting Users in UX: Research Methods for Strategy
Putting Users in UX: Research Methods for Strategy
 

Mehr von pfarina

Opportunities Flat, Compensation Up In The Corporate Security Industry Secu...
Opportunities Flat, Compensation Up In The Corporate Security Industry   Secu...Opportunities Flat, Compensation Up In The Corporate Security Industry   Secu...
Opportunities Flat, Compensation Up In The Corporate Security Industry Secu...pfarina
 
Top 5 Recession Proof Careers The Degree 360
Top 5 Recession Proof Careers The Degree 360Top 5 Recession Proof Careers The Degree 360
Top 5 Recession Proof Careers The Degree 360pfarina
 
Officer Layoffs Getting A Pink Slip Article Police Magazine
Officer Layoffs  Getting A Pink Slip   Article   Police MagazineOfficer Layoffs  Getting A Pink Slip   Article   Police Magazine
Officer Layoffs Getting A Pink Slip Article Police Magazinepfarina
 
Safeguarding Your Home Before You Leave For Vacation
Safeguarding Your Home Before You Leave For VacationSafeguarding Your Home Before You Leave For Vacation
Safeguarding Your Home Before You Leave For Vacationpfarina
 
How To Survive A Pirate Attack Fox News
How To Survive A Pirate Attack   Fox NewsHow To Survive A Pirate Attack   Fox News
How To Survive A Pirate Attack Fox Newspfarina
 
What To Do If A Revolution Spoils Your Trip Fox News
What To Do If A Revolution Spoils Your Trip   Fox NewsWhat To Do If A Revolution Spoils Your Trip   Fox News
What To Do If A Revolution Spoils Your Trip Fox Newspfarina
 
Chicago Sun Times Soft Spot In Aircraft Security
Chicago Sun Times Soft Spot In Aircraft SecurityChicago Sun Times Soft Spot In Aircraft Security
Chicago Sun Times Soft Spot In Aircraft Securitypfarina
 
The Washington Post "Confused And Abused By The Tsa" article
The Washington Post   "Confused And Abused By The Tsa" articleThe Washington Post   "Confused And Abused By The Tsa" article
The Washington Post "Confused And Abused By The Tsa" articlepfarina
 
The Farina Group Corporate Overview
The Farina Group Corporate OverviewThe Farina Group Corporate Overview
The Farina Group Corporate Overviewpfarina
 
Traveling Abroad With Children
Traveling Abroad With ChildrenTraveling Abroad With Children
Traveling Abroad With Childrenpfarina
 
Holes In Hotel Security, Security Management
Holes In Hotel Security,  Security ManagementHoles In Hotel Security,  Security Management
Holes In Hotel Security, Security Managementpfarina
 
Business Travel Executive, Rough Edges
Business Travel Executive, Rough EdgesBusiness Travel Executive, Rough Edges
Business Travel Executive, Rough Edgespfarina
 

Mehr von pfarina (12)

Opportunities Flat, Compensation Up In The Corporate Security Industry Secu...
Opportunities Flat, Compensation Up In The Corporate Security Industry   Secu...Opportunities Flat, Compensation Up In The Corporate Security Industry   Secu...
Opportunities Flat, Compensation Up In The Corporate Security Industry Secu...
 
Top 5 Recession Proof Careers The Degree 360
Top 5 Recession Proof Careers The Degree 360Top 5 Recession Proof Careers The Degree 360
Top 5 Recession Proof Careers The Degree 360
 
Officer Layoffs Getting A Pink Slip Article Police Magazine
Officer Layoffs  Getting A Pink Slip   Article   Police MagazineOfficer Layoffs  Getting A Pink Slip   Article   Police Magazine
Officer Layoffs Getting A Pink Slip Article Police Magazine
 
Safeguarding Your Home Before You Leave For Vacation
Safeguarding Your Home Before You Leave For VacationSafeguarding Your Home Before You Leave For Vacation
Safeguarding Your Home Before You Leave For Vacation
 
How To Survive A Pirate Attack Fox News
How To Survive A Pirate Attack   Fox NewsHow To Survive A Pirate Attack   Fox News
How To Survive A Pirate Attack Fox News
 
What To Do If A Revolution Spoils Your Trip Fox News
What To Do If A Revolution Spoils Your Trip   Fox NewsWhat To Do If A Revolution Spoils Your Trip   Fox News
What To Do If A Revolution Spoils Your Trip Fox News
 
Chicago Sun Times Soft Spot In Aircraft Security
Chicago Sun Times Soft Spot In Aircraft SecurityChicago Sun Times Soft Spot In Aircraft Security
Chicago Sun Times Soft Spot In Aircraft Security
 
The Washington Post "Confused And Abused By The Tsa" article
The Washington Post   "Confused And Abused By The Tsa" articleThe Washington Post   "Confused And Abused By The Tsa" article
The Washington Post "Confused And Abused By The Tsa" article
 
The Farina Group Corporate Overview
The Farina Group Corporate OverviewThe Farina Group Corporate Overview
The Farina Group Corporate Overview
 
Traveling Abroad With Children
Traveling Abroad With ChildrenTraveling Abroad With Children
Traveling Abroad With Children
 
Holes In Hotel Security, Security Management
Holes In Hotel Security,  Security ManagementHoles In Hotel Security,  Security Management
Holes In Hotel Security, Security Management
 
Business Travel Executive, Rough Edges
Business Travel Executive, Rough EdgesBusiness Travel Executive, Rough Edges
Business Travel Executive, Rough Edges
 

Analyze The Threat From Mobile Devices Article, Processor

  • 1. Tech & Trends Click To Print General Information September 24, 2010 • Vol.32 Issue 20 Page(s) 41 in print issue Analyze The Threat From Mobile Devices Protect Devices With Security Policies, Plans For Information Recovery Among the greatest workplace changes taking place Key Points within the past decade or so is the amount of enterprise information leaving the office along with employee • With increased use of mobile devices comes the laptops and smartphones. Even one decade ago, need for a mobile device employees seldom worked from home or while on the security policy. road, and they certainly didn’t tote small computers everywhere, says Stephen Midgley, vice president of • Thieves now realize the global marketing at software security maker Absolute importance of information stored on mobile devices Software. With the explosive growth of enterprise- and are specifically targeting issued mobile devices comes the threat of theft and the them. access by outsiders to the information on them, he says. • Software installed at the To add another wrinkle, attackers now understand the enterprise level is capable of tracking lost devices and of value of the enterprise information stored on mobile wiping them clean of devices and are specifically targeting them, be-cause sensitive enterprise they’re so widely used, says Hugh Thompson, program information. committee chair for the RSA Conference, an annual IT security conference. Because the enterprise information value can far outweigh the value of the device itself, experts recommend IT managers have a plan for mobile device use by employees and for information recovery in the event of theft. “When organizations are allowing users to connect their devices to the network and download confidential business data--whether that’s internal information or customer data--you need a security policy that states how the devices should be encrypted,” says Matt Bossom, the program manager for technology solutions at IT security company ”Accuvant (www.accuvant.com). Policy In Place
  • 2. The enterprise will need to budget for mobile device security, Midgley of Absolute Software (www.absolute.com) says, because the IT department will need authentication tools and likely special software to track a device and wipe its hardware in the event of loss. Bossom recommends IT managers take authentication steps beyond the authentication available with the device out-of-the-box. Many mobile device platforms for use at the enterprise level include stronger authentication than the authentication installed within the device itself, he adds. “The same authentication policy can be used for all different types of devices and can be pushed out across the network,” Bossom says. “This is the same way Windows Server pushes out updates using group policy.” This type of authentication means employees will have to enter a password every time they access the device. IT managers must ensure passwords aren’t easy for thieves to guess (“no one, two, three, four” says Bossom) and that employees haven’t taped the passwords to the device itself or placed it somewhere within their laptop bag, says Philip Farina chief executive officer of Farina and Associates, Ltd. (www.farina- associates.com), a security and risk consultancy for the hospitality industry. Sure it’s a hassle for employees to enter a password each time they check their phones for new emails, but doing so reminds them they’re using a workplace-issued device that includes confidential information, he adds. Of course an enterprise mobile device security policy will need to set out rules for use that may seem almost common sense, but having them in writing helps, Farina adds. He recommends IT managers warn employees against leaving their device in sight on a restaurant table or bar--employees should carry it in their purse, pocket, or a carrying case they have beside them at all times. When staying in a hotel room, lock the device in the safe or lockbox when not in use. To that end, ask employees to call ahead to ensure their hotel room will be equipped with a lockbox and that they select only hotels that include the feature, he says. They should also ask employees to keep the devices to themselves, the RSA Conference’s Thompson adds. “You have to take into account [the] social and free nature with which people pass these things around,” he says. “If it’s a work laptop, they might not let someone use it for a second to look something up, but with a smartphone, they’d be more inclined to hand it over to let someone call up a map or something.” In Case Of Theft An enterprise’s mobile-device security policy should also outline the steps employees must take should their device go missing. “Usually that means contacting a response center or the IT department or someone else in corporate so the phone can get shut down ASAP,” Farina says.
  • 3. The policy will also likely call for the IT department to install device protection on laptops and run software capable of remotely wiping information from stolen laptops, Absolute Software’s Midgley says. The tracking software relies on technology embedded within the chips produced by most major chip vendors, he adds. When a laptop is lost or stolen, the software syncs with the device’s chip--which includes GPS capabilities--when the device is connected to the Internet. This allows law enforcement to track and seize the device. The tracking software can also wipe the device remotely to remove all confidential business information, Midgley says. Such tracking capabilities are also available for smartphones, he adds. Policies needn’t be overly restrictive, Farina says. Mostly, they just outline good, common-sense rules for device use--coupled with specific hardware and software IT departments should use to safeguard sensitive enterprise information. by Jean Thilmany Overseas Travel Here’s one unexpected tip for overseas travelers. Leave your enterprise- issued mobile device at home. Or bring a second laptop or smartphone that contains minimal enterprise information, says Philip Farina, chief executive officer of Farina and Associates, Ltd. (www.farina- associates.com), a security and risk consultancy for the hospitality industry. The risk of theft is just too high overseas, especially in some countries where thieves specifically target Western business travelers. Copyright © 2010 Sandhills Publishing Company U.S.A. All rights reserved.