Archive for 'Mobile Device Security Kit' Category
Lack of Updates Cause Endpoint Security Concerns
By Vigilize - Last updated: Tuesday, June 20, 2017
Smartphones and tablets may receive infrequent updates and can be difficult to manage. An article review. Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update? Duo Security released their 2017 Trusted Access Report recently, and it […]
Technical BYOD Controls for Banks
By Dan Hadaway - Last updated: Thursday, September 13, 2012
Dan and Sean expanded a research report for a Client to benefit us all! This article includes a comparison of MDM vendors as well as advice in developing technical controls for portable devices!
Survey Confirms BYOD Continues to Present Serious Threat
By Vigilize - Last updated: Thursday, August 16, 2012
Just when you think progress is being made in educating employees about BYOD security vulnerabilities, another survey releases results like this: In a 400 person survey of office workers, 47% said they do not use a password on their mobile phone.
A Cure for BYOD?
By Vigilize - Last updated: Friday, June 29, 2012
Using mobile devices in the workforce has grown in popularity. However, some organizations haven’t jumped to purchasing those devices. Some employees, either out of need or convenience, have used an alternate route in that they bring their own device (BYOD) to work. This brings up some security concerns. To address this, AT&T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat.
Mobile Security White Paper: Non-technical Controls
By Dan Hadaway - Last updated: Tuesday, June 19, 2012
This white paper addresses the risks associated with the relatively new phenomena surrounding the introduction of corporate-owned data on Portable Devices, currently known by buzzwords such as mobile computing, mobile devices, mobile technology, etc.
Mobile Security White Paper for BYOD and/or Issued Devices
By Vigilize - Last updated: Tuesday, June 19, 2012
The auditors at infotex have created a set of non-technical controls (ie: policies and procedures) governing the use of mobile devices. This white paper (Mobile Security White Paper: Non-technical Controls) discusses considerations that should be addressed in creating such controls. The Era of Mobile Devices
BYOD Policy – Bring Your Own Device Policy
By Dan Hadaway - Last updated: Saturday, June 9, 2012
This kit includes all you need to properly document policies and procedures for mobile devices and BYOD: a policy document, a risk assessment, a standards document, an audit checklist . . . . . even an agenda for kicking off the project!
Portable Devices Configuration Standards
By Michael Hartke - Last updated: Wednesday, June 6, 2012
This document establishes all the technical security standards that must be met to properly enforce the modified Acceptable Use Policy and high-level IT governance policy as well as, of course, the Portable Devices Security Procedure.
Portable Devices Audit Checklist
By Michael Hartke - Last updated: Wednesday, June 6, 2012
Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices. It includes an asset inventory as well as a checklist for smartphones, tablet pc’s, and laptops. It makes an excellent mobile devices audit checklist! All templates are color-coded, […]
Portable Devices Risk Assessment
By Michael Hartke - Last updated: Wednesday, June 6, 2012
This “drill-down risk assessment” will help you determine risks and controls related to mobile device security and BYOD!
Smartphones and tablets may receive infrequent updates and can be difficult to manage. An article review. Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update? Duo Security released their 2017 Trusted Access Report recently, and it […]
Dan and Sean expanded a research report for a Client to benefit us all! This article includes a comparison of MDM vendors as well as advice in developing technical controls for portable devices!
Survey Confirms BYOD Continues to Present Serious Threat
By Vigilize - Last updated: Thursday, August 16, 2012
Just when you think progress is being made in educating employees about BYOD security vulnerabilities, another survey releases results like this: In a 400 person survey of office workers, 47% said they do not use a password on their mobile phone.
A Cure for BYOD?
By Vigilize - Last updated: Friday, June 29, 2012
Using mobile devices in the workforce has grown in popularity. However, some organizations haven’t jumped to purchasing those devices. Some employees, either out of need or convenience, have used an alternate route in that they bring their own device (BYOD) to work. This brings up some security concerns. To address this, AT&T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat.
Mobile Security White Paper: Non-technical Controls
By Dan Hadaway - Last updated: Tuesday, June 19, 2012
This white paper addresses the risks associated with the relatively new phenomena surrounding the introduction of corporate-owned data on Portable Devices, currently known by buzzwords such as mobile computing, mobile devices, mobile technology, etc.
Mobile Security White Paper for BYOD and/or Issued Devices
By Vigilize - Last updated: Tuesday, June 19, 2012
The auditors at infotex have created a set of non-technical controls (ie: policies and procedures) governing the use of mobile devices. This white paper (Mobile Security White Paper: Non-technical Controls) discusses considerations that should be addressed in creating such controls. The Era of Mobile Devices
BYOD Policy – Bring Your Own Device Policy
By Dan Hadaway - Last updated: Saturday, June 9, 2012
This kit includes all you need to properly document policies and procedures for mobile devices and BYOD: a policy document, a risk assessment, a standards document, an audit checklist . . . . . even an agenda for kicking off the project!
Portable Devices Configuration Standards
By Michael Hartke - Last updated: Wednesday, June 6, 2012
This document establishes all the technical security standards that must be met to properly enforce the modified Acceptable Use Policy and high-level IT governance policy as well as, of course, the Portable Devices Security Procedure.
Portable Devices Audit Checklist
By Michael Hartke - Last updated: Wednesday, June 6, 2012
Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices. It includes an asset inventory as well as a checklist for smartphones, tablet pc’s, and laptops. It makes an excellent mobile devices audit checklist! All templates are color-coded, […]
Portable Devices Risk Assessment
By Michael Hartke - Last updated: Wednesday, June 6, 2012
This “drill-down risk assessment” will help you determine risks and controls related to mobile device security and BYOD!
Just when you think progress is being made in educating employees about BYOD security vulnerabilities, another survey releases results like this: In a 400 person survey of office workers, 47% said they do not use a password on their mobile phone.
Using mobile devices in the workforce has grown in popularity. However, some organizations haven’t jumped to purchasing those devices. Some employees, either out of need or convenience, have used an alternate route in that they bring their own device (BYOD) to work. This brings up some security concerns. To address this, AT&T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat.
Mobile Security White Paper: Non-technical Controls
By Dan Hadaway - Last updated: Tuesday, June 19, 2012
This white paper addresses the risks associated with the relatively new phenomena surrounding the introduction of corporate-owned data on Portable Devices, currently known by buzzwords such as mobile computing, mobile devices, mobile technology, etc.
Mobile Security White Paper for BYOD and/or Issued Devices
By Vigilize - Last updated: Tuesday, June 19, 2012
The auditors at infotex have created a set of non-technical controls (ie: policies and procedures) governing the use of mobile devices. This white paper (Mobile Security White Paper: Non-technical Controls) discusses considerations that should be addressed in creating such controls. The Era of Mobile Devices
BYOD Policy – Bring Your Own Device Policy
By Dan Hadaway - Last updated: Saturday, June 9, 2012
This kit includes all you need to properly document policies and procedures for mobile devices and BYOD: a policy document, a risk assessment, a standards document, an audit checklist . . . . . even an agenda for kicking off the project!
Portable Devices Configuration Standards
By Michael Hartke - Last updated: Wednesday, June 6, 2012
This document establishes all the technical security standards that must be met to properly enforce the modified Acceptable Use Policy and high-level IT governance policy as well as, of course, the Portable Devices Security Procedure.
Portable Devices Audit Checklist
By Michael Hartke - Last updated: Wednesday, June 6, 2012
Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices. It includes an asset inventory as well as a checklist for smartphones, tablet pc’s, and laptops. It makes an excellent mobile devices audit checklist! All templates are color-coded, […]
Portable Devices Risk Assessment
By Michael Hartke - Last updated: Wednesday, June 6, 2012
This “drill-down risk assessment” will help you determine risks and controls related to mobile device security and BYOD!
This white paper addresses the risks associated with the relatively new phenomena surrounding the introduction of corporate-owned data on Portable Devices, currently known by buzzwords such as mobile computing, mobile devices, mobile technology, etc.
The auditors at infotex have created a set of non-technical controls (ie: policies and procedures) governing the use of mobile devices. This white paper (Mobile Security White Paper: Non-technical Controls) discusses considerations that should be addressed in creating such controls. The Era of Mobile Devices
BYOD Policy – Bring Your Own Device Policy
By Dan Hadaway - Last updated: Saturday, June 9, 2012
This kit includes all you need to properly document policies and procedures for mobile devices and BYOD: a policy document, a risk assessment, a standards document, an audit checklist . . . . . even an agenda for kicking off the project!
Portable Devices Configuration Standards
By Michael Hartke - Last updated: Wednesday, June 6, 2012
This document establishes all the technical security standards that must be met to properly enforce the modified Acceptable Use Policy and high-level IT governance policy as well as, of course, the Portable Devices Security Procedure.
Portable Devices Audit Checklist
By Michael Hartke - Last updated: Wednesday, June 6, 2012
Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices. It includes an asset inventory as well as a checklist for smartphones, tablet pc’s, and laptops. It makes an excellent mobile devices audit checklist! All templates are color-coded, […]
Portable Devices Risk Assessment
By Michael Hartke - Last updated: Wednesday, June 6, 2012
This “drill-down risk assessment” will help you determine risks and controls related to mobile device security and BYOD!
This kit includes all you need to properly document policies and procedures for mobile devices and BYOD: a policy document, a risk assessment, a standards document, an audit checklist . . . . . even an agenda for kicking off the project!
This document establishes all the technical security standards that must be met to properly enforce the modified Acceptable Use Policy and high-level IT governance policy as well as, of course, the Portable Devices Security Procedure.
Portable Devices Audit Checklist
By Michael Hartke - Last updated: Wednesday, June 6, 2012
Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices. It includes an asset inventory as well as a checklist for smartphones, tablet pc’s, and laptops. It makes an excellent mobile devices audit checklist! All templates are color-coded, […]
Portable Devices Risk Assessment
By Michael Hartke - Last updated: Wednesday, June 6, 2012
This “drill-down risk assessment” will help you determine risks and controls related to mobile device security and BYOD!
Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices. It includes an asset inventory as well as a checklist for smartphones, tablet pc’s, and laptops. It makes an excellent mobile devices audit checklist! All templates are color-coded, […]
This “drill-down risk assessment” will help you determine risks and controls related to mobile device security and BYOD!