It's Not 'Mobile Security,' It's Just Security
Mobility and BYOD are no different from any other IT security challenge, so it's time for an integrated approach across all the ways people work.
Hold on a minute. Mobile security isn't something you can buy, so put down the checkbook, back away from the MDM system and realize that what we have here is a process and a trust problem.
I don't blame CIOs for feeling like a deer in the headlights. But I do blame many of them for thinking that mobility is different from any other IT security challenge. Heck, the risks aren't even new. The big increase in concern simply highlights the bad process, communications and technology decisions that most infosec teams have made over the past 10 years.
Take a look below at the "Top Five" checklist from a major mobility and IT security provider (which shall remain nameless):
1. Label all mobile devices with user and company information.
2. Require a user to authenticate to the device using a security password.
3. Define authentication features, such as password expiry, attempt limits, length and strength.
... Read full story on InformationWeek
Post a comment to the original version of this story on InformationWeek