These postings are provided "AS IS" with no warranties, and confers no rights. You assume all risk for your use.
Anthony Bartolo Twitter | LinkedIn
Stephen IbarakiIndustry AnalystFCIPS, I.S.P., ITCP/IP3P, DFNPA, CNP, FGITCA, MVP
I was interviewed on the topic of Mobile, Wireless, and Security several times this year however only a portion typically makes it to print so I'm blogging about it.
I encourage you to share your experiences here or send me an e-mail at email@example.com, Thank you from Stephen Ibaraki, I.S.P., DF/NPA, CNP_________________________________
This is a four-part blog series:
Part 1/4: The Major Move to Mobile and Wireless: are you prepared?Part 2/4: The Value of Security for Mobile/WirelessPart 3/4: Managing Mobile and Wireless Security EffectivelyPart 4/4: 5 Essential Tips for Mobile and Wireless Computing
There are many possible solutions. For example, to protect laptops, a business can encrypt the laptop hard disk data using encryption features native to Windows operating systems. To control access to hard drives and manage internet access, a Virtual Machine (VM) environment can be implemented. This creates a controlled, secure, policy managed virtual machine environment on the laptop or mobile computer. The VM is created by the business and can be implemented quickly on mobile computers. Also, if the computer becomes corrupted, it's quick and easy to re-implement the managed system using VM technology. The VM environment also provides a controlled environment to prevent problems coming from home use or accessing the business network using a VPN.
There should also be guidelines; access, network, and security policies in place. There are so many I include only a few here: