Mobile workers need protecting, so does your network
The rise in BYOD (bring your own device) has meant a sharp increase in the number of devices connecting to the corporate network.
Employee-owned devices can and probably will leak corporate data. A strategy must be in place to deal with lost or stolen devices with sensitive data that cannot be remotely wiped, malware infections, and sensitive data that’s too easily sent to unauthorised third parties.
Good secure access to an organisation’s apps from a mobile is more than putting a firewall in place. So how does an organisation create and enforce a proper network security strategy that allows access from mobile devices.
Securing the network with IT governance
The challenge of secure networks to cope with mobile access is not intractable but will necessitate a lot of thinking. It will also need an IT governance plan of action. Any decent network security strategy must include device discovery and impact assessment as well as base conditions for acceptable use.
Most wireless network and access control products have device discovery features that IT can use to detect mobile devices. Devices that fall into certain categories can be directed to mobile device management enrolment portals. The rest can be blocked until administrators can investigate further.
Deciding on which devices are blocked versus those that can be enrolled should be done in consultation with business units to define application and data requirements and ascertain the related risks and security competences.
Carrying out such assessments should lead to the creation of documented mobile device benchmarks that any device must pass to be approved. At a minimum, the conditions should include support for remote wipe, passcode-based device access control and hardware encryption.
A well-thought-out strategy for network security when it comes to mobile devices should decrease the risk from lost or stolen phones, tablets and laptops. Some parts of the business may want stricter requirements such as two-factor authentication, or stronger encryption.
After establishing the standards that mobile devices should adhere to, IT should also create and maintain lists of those devices it will support as well as those it considers too disruptive to do so.
User education
As a single data breach can cost more than the cost of training staff, education users on the best practices when it comes to mobile security is a good strategy to defend your network and an effective preventative measure.
Putting the emphasis on the effects of mobile device misuse, loss or theft will give employees a greater motivation to obey corporate policy. But users need to know the specifics.
Users should know what the proper procedures are for storing and transporting their devices. This can be as simple as instructing them not to leave devices unattended in public locations.
They should also be aware that security policies can be broken by copying sensitive data (such as staff details and corporate intellectual property) to unencrypted device storage can have severe ramifications for the user.
Users should also know what the procedures are for changing or setting passwords for mobile devices, in accordance with an organisation’s existing password policy.
Making sure that employees have a good grounding on an enterprise’s network security policy will help a lot in decreasing security breaches.
After strategy come enforcement
The essential part of any network security strategy when it comes to mobile access in enforcement. If any policies that are created as a result of your strategy are unenforceable, it will be essentially worthless. It is crucial that when developing a network security mobile access policy that it should be easy to configure, deploy and enforce.
7 Comments
Зареструватися - March 18, 2024
I don’t think the title of your article matches the content lol. Just kidding, mainly because I had some doubts after reading the article.
Allen Dave - October 23, 2024
Hello, as a newbie to cryptocurrency trading, I lost a lot of money trying to navigate the market on my own, then in my search for a genuine and trusted trader/broker, i came across Trader Bernie Doran who guided and helped me retrieve my lost cryptocurrencies and I made so much profit up to the tune of $60,000. I made my first investment with $2,000 and got a ROI profit of $25,000 in less than 2 week. You can contact this expert trader Mr Bernie Doran via Gmail : BERNIEDORANSIGNALS@GMAIL.COM or WhatsApp + 1 424 285 0682 and be ready to share your experience, tell him I referred you
najlepsí binance odkazov'y kód - April 20, 2024
Can you be more specific about the content of your article? After reading it, I still have some doubts. Hope you can help me.
binance bonus za prijavo - July 22, 2024
I don’t think the title of your article matches the content lol. Just kidding, mainly because I had some doubts after reading the article.
binance - July 29, 2024
Thanks for sharing. I read many of your blog posts, cool, your blog is very good.
Сайт - September 25, 2024
Вся информация, представленная на данном сайте, носит исключительно информационный характер и предназначена для ознакомления с деятельностью онлайн-казино. Сайт не являемся оператором игр и не предоставляем услуг по организации азартных игр. xxnxnlhwmc … https://7kazik.ru/static/
hannah barron - November 21, 2024
I am open to share my experience with bitcoin investment and losing money to scammers. However, yes it is possible to recover your stolen bitcoins. I never believed in bitcoin recovery because i was made to understand that it was not possible. However, sometime in october i fell for a forex scam which promised overly high returns and i ended up losing close to $70,000. I searched for a month for help until i finally came across an article on reddit in regards to recovering stolen cryptocurrency so i reached out to him at [BERNIEDORANSIGNALS [at] gmail com.] I was so scared and skeptical because i have heard of bad experiences but i decided to give them a try and to my greatest surprise i was able to get all my stolen bitcoins recovered from the scammers within a very short time frame. I don’t know if i’m allowed to share the links on here but you can contact if you also need help.