Mobile & Wireless Slideshow: 10 Steps CIOs Can Take to Bolster Mobile Security

By Don Reisinger  |  Posted 08-04-2010

10 Steps CIOs Can Take to Bolster Mobile Security

Create A Use Policy - and Enforce itTell employees how they should use their smartphones. An effective use policy means there are no excuses for sensitive information leaks.

10 Steps CIOs Can Take to Bolster Mobile Security

10 Steps CIOs Can Take to Bolster Mobile Security - Page 2

Use Security AppsSecurity apps are available for BlackBerry, iPhone, and Android devices and should be downloaded to every employee's smartphone. Even a single strong encryption app helps protect data.

10 Steps CIOs Can Take to Bolster Mobile Security  - Page 2

10 Steps CIOs Can Take to Bolster Mobile Security - Page 3

Stick With Known PlatformsDo your research to see what level of administrative control each smartphone platform offers. Knowing what you're getting into is integral to the mobile security of your company.

10 Steps CIOs Can Take to Bolster Mobile Security  - Page 3

10 Steps CIOs Can Take to Bolster Mobile Security - Page 4

Consider AlternativesA Windows 7-based netbook has the same security controls available for corporate computers. Apple's iPad offers several administrative controls.

10 Steps CIOs Can Take to Bolster Mobile Security  - Page 4

10 Steps CIOs Can Take to Bolster Mobile Security - Page 5

Maintain the FirewallMalicious hackers want to use that mobile phone to access to your network and get to valuable data. A strong corporate firewall shouldn't allow any smartphones in without proper rights.

10 Steps CIOs Can Take to Bolster Mobile Security  - Page 5

10 Steps CIOs Can Take to Bolster Mobile Security - Page 6

Authenticate, Authenticate, AuthenticateForce all smartphone traffic to authenticate to the network and to all systems on that network. Given how easy it is to spoof a legitimate device, this is integral to playing it safe.

10 Steps CIOs Can Take to Bolster Mobile Security  - Page 6

10 Steps CIOs Can Take to Bolster Mobile Security - Page 7

The Value of a Good EducationInvest in classes that teach your employees about what can happen when a security breach occurs. Share best practices and make usage rules and policies crystal clear.

10 Steps CIOs Can Take to Bolster Mobile Security  - Page 7

10 Steps CIOs Can Take to Bolster Mobile Security - Page 8

Jailbreaking Will Wreak HavocMost security experts say that jailbreaking a device, such as an iPhone, will remove up to 80 percent of the product's security features. Never allow employees to jailbreak devices.

10 Steps CIOs Can Take to Bolster Mobile Security  - Page 8

10 Steps CIOs Can Take to Bolster Mobile Security - Page 9

Keep Data Off the DeviceMandate that employees sync devices with computers as often as possible to ensure that mission-critical data is kept off their smartphones. Hackers can't steal data if it isn't available.

10 Steps CIOs Can Take to Bolster Mobile Security  - Page 9

10 Steps CIOs Can Take to Bolster Mobile Security - Page 10

Assume Any OS Can Be HackedNo mobile operating system is 100 percent safe from a savvy hacker. Be diligent, do your homework, and implement the right security solutions.

10 Steps CIOs Can Take to Bolster Mobile Security  - Page 10