Jlhoffman Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 2 November 2012

Portable Device Security On Your Network

Posted on 14:58 by Unknown
I'm frequently stunned by the lack of attention being given to the security risks of portable computing devices on business networks by SMB management.  Especially with more and more applications being used in the cloud, security for personal device is more important than ever.

The current term is BYOD as in Bring Your Own Device and businesses have to recognize that employees CAN be more productive using these devices but without proper planning for security the risks to business can be dramatic.

Especially if you're in a regulated industry like health care, the risk of exposure of confidential personal information is enormous as are the financial penalties associated with those exposures. 

A 2010 study by Ponemon Institute, found that data breaches of patient information cost healthcare organizations nearly $6 billion annually, and that many breaches go undetected.  As portable computing devices proliferate in the workplace that number is probably going to go up exponentially.

Administrators must look to protect all layers of the mobile computing environment – both the endpoint devices and the communication channels that connect the device to the network. Some strategies that are effective include:
  • Network access controls to ensure outsiders cannot hack into the wireless network and infiltrate devices
  • Education to help users be smarter about how they use and protect their mobile devices
  • Improved authentication to control device access.
  • Many organizations use role-based policies to control who has access to what applications, when and on what devices access is permitted.
There are a wealth of portable device management solutions once you determine that you're going to allow employees to use their own devices for business purposes.  There's no one-size-fits-all solution for everybody so if you need help in developing a policy for portable device use on or off campus or need help picking the most appropriate solution based upon your unique circumstances, don't hesitate to give me a call @ 847-639-7000.

For those of you that would like to see a short 6 minute video by Symantec on the possible ways to secure portable devices, here is a link to a video by them: http://bcove.me/wy22iac5

Have a good weekend!
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Ransomeware Now #1 MalwareThreat - Learn More Here
    I just read an outstanding white paper from a couple of researchers at Sophos Security outlining how Ransomware is passing up FakeAlert malw...
  • Computer Support Rates - When Cheap Really Isn't
    What's in a labor rate?  Why are some IT companies more expensive than others?  Our company is neither the most expensive in our market ...
  • Server Configuration - Heaven Save Us From Well-Meaning Amateurs!
    How do I tell the client what their old tech did to them?  They've got to spend a bunch of money to correct the mess he made and I'm...
  • When It's Time To Fire A Customer
    What?  Isn't that backwards?  Isn't it the customer that usually does the firing? Usually, as business people, we work so hard to fi...
  • Using Personal Computers In the Workplace
    At ACT, we support a great many organizations that allow employees to use their own computers at work.  Sadly, I've noticed that some of...
  • What to do with Windows XP
    Well, it had a good long run.  Windows XP is now 13 years old.  In less than 10 months Microsoft is pulling the plug on our old friend XP.  ...
  • Wireless Networking Is Due For A Big Jump In Performance
    Just when we were getting comfortable with the 802.11n wireless standard, here comes a newer and better wireless solution - 802.11ac.  It wi...
  • Documentation - The Key To Client Support Success
    Recently, we won the trust of a new client that was unhappy with the service provided by their previous IT company.  After the client notifi...
  • Going to the Cloud is easy, getting out is a lot tougher!
    Everyone is pushing you to take your business to the cloud, right?  It's easy, right?  The sales rep used all the right words in his pit...
  • Support for Windows XP and Office 2003 stops on April 8th.
    All Microsoft support for Windows XP and Office 2003 stops on April 8th. What are the risks to your business if you don't upgrade? Let...

Blog Archive

  • ►  2013 (39)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (4)
    • ►  July (3)
    • ►  June (9)
    • ►  May (3)
    • ►  April (3)
    • ►  March (6)
    • ►  January (2)
  • ▼  2012 (12)
    • ►  December (2)
    • ▼  November (8)
      • New Malware That Hides Your Data
      • What? Apple leads in vulnerabilities? AND What t...
      • Microsoft Windows 8 - Introducing Chaos In The Wor...
      • Addressing Data Ownership In The Cloud
      • Malware on Mobile devices like Smartphones and Tab...
      • Helping a Client With e-Discovery
      • Portable Device Security On Your Network
      • Conventions in the Cloud? Where will it all end?
    • ►  October (2)
Powered by Blogger.

About Me

Unknown
View my complete profile