Security best practices for smartphone policies

Written By Solution Anti Virus on Wednesday, March 2, 2011 | 8:15 AM


Security best practices for smartphone policies
Smartphone security in the business environment requires a two-pronged approach: protect the phones from being compromised and protect the company network from being compromised by the compromised phones. Here are some security best practices that you can incorporate into your smartphone policies.


  1. 1. Require users to enable PIN/password protection on their phones.
  2. 2. Require users to use the strongest PINs/passwords on their phones.
  3. 3. Require users to encrypt data stored on their phones.
  4. 4. Require users to install mobile security software on their phones to protect against viruses and malware.
  5. 5. Educate users to turn off the applications that aren’t needed. This will not only reduce the attack surface, it will also increase battery life.
  6. 6. Have users turn off Bluetooth, Wi-Fi, and GPS when not specifically in use.
  7. 7. Have users connect to the corporate network through an SSL VPN.
  8. 8. Consider deploying smartphone security, monitoring, and management software such as that offered by Juniper Networks for Windows Mobile, Symbian, iPhone, Android, and BlackBerry.
  9. 9. Some smartphones can be configured to use your rights management system to prevent unauthorized persons from viewing data or to prevent authorized users from copying or forwarding it.
  10. 10. Carefully consider a risk/benefits analysis when making the decision to allow employee-owned smartphones to connect to the corporate network.

Anda sedang membaca artikel tentang

Security best practices for smartphone policies

Dengan url

http://free-software-solution.blogspot.com/2011/03/security-best-practices-for-smartphone.html

Anda boleh menyebar luaskannya atau mengcopy paste-nya

Security best practices for smartphone policies

namun jangan lupa untuk meletakkan link

Security best practices for smartphone policies

sebagai sumbernya

0 komentar:

Post a Comment

techieblogger.com Techie Blogger Techie Blogger