- Use Cases
Updated September 10, 2020: This post was originally published on June 14, 2011, and has been updated to reflect technology and industry changes.
As our network security architectures have improved, so too have the threats that they face from would-be intruders.
With the consumerization of IT and the subsequent dramatic uptick in personal mobile devices being brought onto our corporate campuses, organizations must create a sustainable mobile risk management policy in order to keep their data and people safe. Managing the risk posed by smart-phones and other mobile/wireless devices will help to curb your threat profile, as well as reduce your exposure to data hacking, and is paramount for your strategy moving forward.
A mobile device security policy, sometimes called a Bring Your Own Device (BYOD) policy, is a way for organizations to protect themselves from potential data security incidents. It can include everything from carrier activation and encryption technologies to security certificates and procedures for taking inventory of mobile device data. As our workplaces and organizations are flooded with more personal and company-issued devices, there is a lot to consider when it comes to implementing a mobile device security policy.
Here are some best practices to follow within the wireless infrastructure to create a safe transmission space. You can use these guidelines as a check list to start securing your data.
Learn more about securing your corporate spaces today.
Tom Kellermann previously held the position of CTO for AirPatrol, an Inpixon Company. In 2020, he was appointed to the Cyber Investigations Advisory Board for the United States Secret Service. On January 19, 2017, Tom was appointed the Wilson Center’s Global Fellow for Cyber Policy. In 2008 Tom was appointed a commissioner on the Commission on Cyber Security for the 44th President of the United States. In 2003 he co-authored the Book “Electronic Safety and Soundness: Securing Finance in a New Age.”