Archive for 'Mobile Device Security Kit' Category
Smartphones and tablets may receive infrequent updates and can be difficult to manage. An article review. Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update? Duo Security released their 2017 Trusted Access Report recently, and it […]
Dan and Sean expanded a research report for a Client to benefit us all! This article includes a comparison of MDM vendors as well as advice in developing technical controls for portable devices!
Just when you think progress is being made in educating employees about BYOD security vulnerabilities, another survey releases results like this: In a 400 person survey of office workers, 47% said they do not use a password on their mobile phone.
Using mobile devices in the workforce has grown in popularity. However, some organizations haven’t jumped to purchasing those devices. Some employees, either out of need or convenience, have used an alternate route in that they bring their own device (BYOD) to work. This brings up some security concerns. To address this, AT&T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat.
This white paper addresses the risks associated with the relatively new phenomena surrounding the introduction of corporate-owned data on Portable Devices, currently known by buzzwords such as mobile computing, mobile devices, mobile technology, etc.
The auditors at infotex have created a set of non-technical controls (ie: policies and procedures) governing the use of mobile devices. This white paper (Mobile Security White Paper: Non-technical Controls) discusses considerations that should be addressed in creating such controls. The Era of Mobile Devices
This kit includes all you need to properly document policies and procedures for mobile devices and BYOD: a policy document, a risk assessment, a standards document, an audit checklist . . . . . even an agenda for kicking off the project!
This document establishes all the technical security standards that must be met to properly enforce the modified Acceptable Use Policy and high-level IT governance policy as well as, of course, the Portable Devices Security Procedure.
Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices. It includes an asset inventory as well as a checklist for smartphones, tablet pc’s, and laptops. It makes an excellent mobile devices audit checklist! All templates are color-coded, […]
This “drill-down risk assessment” will help you determine risks and controls related to mobile device security and BYOD!