“Five tips for protecting mobile devices” |
Five tips for protecting mobile devices Posted: 15 Nov 2010 09:30 AM PST Your users may not realize how vulnerable their mobile devices are, and that can put your information assets at great risk. Here's some practical advice for securing mobile systems. Attacks against information assets — government, corporate, and personal — have been going on for some time. Yet many users and organizations have blatantly ignored recommendations for protecting mobile devices, exposing themselves, their businesses, their customers, and often employees to harm. These devices in the hands of mobile workers are exposed to a variety of threats:
This is not a complete list of potential attack vectors, but proper attention to those four issues reduces risk to a reasonable and appropriate level. The following steps are a good start in preventing information or system compromise. Note: These tips originally appeared as an entry in our IT Security blog. 1: Store only what you absolutely needThis is my first rule of data leakage protection. Why carry around customer spreadsheets, financial data, or plans for a new product/service if you don't need them while out of the office? Absent Information can't be compromised. 2: Protect data passing over public wired or wireless networksThe best way to prevent casual or directed packet snooping on public networks is packet or session encryption, even if encryption is limited to traffic between the end-user device and a traffic encryption service provider on the Internet. For ultimate protection, use only SSL connections to check email or access company information. When this isn't possible, online services, both free and for-fee, can fill the gap. Two examples are MegaProxy (fee-based) and AnchorFree (free). 3: Configure devices to block external snoopingThe first step in establishing a security perimeter around a device is configuration of a firewall. Personal firewalls are free on laptops running Windows XP or Vista. These solutions provide minimal protection against intruder compromise of your mobile system. More complete protection is available in security suites, like those from AVG, McAfee, or Symantec. Firewalls are also available for many handheld devices, protecting contact lists, email, and other sensitive information commonly found on PDAs and smartphones. The second step is configuring Bluetooth, on laptops and handhelds, to block all unauthorized access. For information on Bluetooth threats and secure configuration, see Secure your Bluetooth wireless networks and protect your data. No laptop should be unnecessarily exposed because it lacks anti-malware protection. 4: Encrypt sensitive information on the deviceI know this is like beating the proverbial dead horse, but laptop theft reports make it clear that many users and organizations haven't yet gotten the message. And laptop encryption doesn't have to drain your budget. Solutions like TrueCrypt provide effective, free file and full-disk encryption. If you need a more centralized approach to key management, lost data destruction, or data recovery, online services like Beachhead or more traditional systems like PGP can help. 5: Back up critical informationAll business critical information should be copied to an alternate location. Even mobile users, who might not connect to the company network every day, can be protected against data loss with online solutions like Symantec's backup.com or with Amazon.com's S3 service, supported with client software like Jungle Disk. And of course, practice standard system hardening practices — patching, shutting down all unneeded services, etc. In addition to following Microsoft's best practices, consider implementing some or all NIST (National Institute of Standards and Technology) recommendations and baseline template settings. This entry passed through the Full-Text RSS service — if this is your content and you're reading it on someone else's site, please read our FAQ page at fivefilters.org/content-only/faq.php |
You are subscribed to email updates from Content Keyword RSS To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment