BE.Weekly

Page 13

Mobile security

5 REQUIRE AUTHENTICATION

Without authentication in place a lost mobile device serves as the keys to your kingdom and anyone who finds it can gain entry to everything.

YOUR 2 TEST DEFENCES

You can spend millions on a mobile security system, but how do you know that it works if you never put it to the test? Get third-party experts without prior knowledge to try and break it.

4 CONTROL CONNECTIVITY

Your file servers may be safe and secure behind a firewall, but it’s all for nothing if mobile devices share files on unsecure public Wi-Fi networks or via Bluetooth.

AN 3 MAINTAIN AUDIT TRAIL

Ensure that every point of entry is identified and every action creates a trail which can be clearly followed. You must see the flow of data in order to protect it.

1 ENFORCE MDM POLICY

You can have the best Mobile Device Management policy in the world, but if you don’t monitor, test and enforce it then it’s useless.

About the Author Michelle Drolet is founder of Towerwall, a data security services provider in Framingham, MA with clients such as PerkinElmer, Smith & Wesson, Middlesex Savings Bank, Brown University and SMBs. michelled@towerwall.com

BE Weekly

| 13


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.