Mobile Device Security Kit

Lack of Updates Cause Endpoint Security Concerns

Smartphones and tablets may receive infrequent updates and can be difficult to manage. An article review. Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update? ...

Technical BYOD Controls for Banks

by Sean Waugh and Dan Hadaway First, let us confess that we used BYOD in the title merely so that we’d catch everybody’s attention. It’s a nice buzzword; who wouldn’t feel like partying after seeing it? But this article is actually about Portable Devices, which is a super...

Survey Confirms BYOD Continues to Present Serious Threat

47% of Mobile Device Users have screen lock disabled! Persisting Threat of BYOD and Mobile Devices Just when you think progress is being made in educating employees about BYOD security vulnerabilities, another survey releases results like this:  In a 400 person survey o...

A Cure for BYOD?

Using mobile devices in the workforce has grown in popularity. However, some organizations haven’t jumped to purchasing those devices. Some employees, either out of need or convenience, have used an alternate route in that they bring their own device (BYOD) to wor...

Mobile Security White Paper: Non-technical Controls

Securing Mobile Devices Note:  Click for a pdf version of this Securing Mobile Devices White Paper. This white paper addresses the risks associated with the relatively new phenomena surrounding the introduction of corporate-owned data on Portable Devices, currently known...

Mobile Security White Paper for BYOD and/or Issued Devices

IT Governance Map for Portable Devices The auditors at infotex have created a set of non-technical controls (ie: policies and procedures) governing the use of mobile devices. This white paper (Mobile Security White Paper: Non-technical Controls) discusses considerations...

BYOD Policy – Bring Your Own Device Policy

Everything you need to write your BYOD policy (Bring Your Own Device policy) and procedures for Mobile Devices Security all in one kit! It can scale to smaller banks simply wanting to take advantage of resources already available (such as Exchange ActiveSync); but it also...

Portable Devices Configuration Standards

Portable Devices Configuration Standards:  This document establishes all the technical security standards that must be met to properly enforce the modified Acceptable Use Policy and high-level IT governance policy as well as, of course, the Portable Devices Security Proce...

Portable Devices Audit Checklist

Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices.  It includes an asset inventory as well as a checklist for sm...

Portable Devices Risk Assessment

The FFIEC is clear about the need to conduct risk assessments focused on the deployment of new technologies. This document is an asset-based drill-down risk assessment that can be used to establish inherent and residual risk on vulnerabilities to smartphones (iPhones, And...