Usage restrictions and implementation guidance for mobile devices include: device identification and authentication configuration management implementation of mandatory protective software (e.g., malicious code detection, firewall) scanning devices for malicious code updating virus protection software scanning for critical software updates and patches conducting primary operating system (and possibly other resident software) integrity checks and disabling unnecessary hardware (e.g., wireless, infrared). Examples of mobile devices include smart phones, e-readers, and tablets.ĭue to the large variety of mobile devices with different technical characteristics and capabilities, organizational restrictions may vary for the different types of devices. Mobile devices may also include voice communication capabilities, on-board sensors that allow the device to capture information, or built-in features for synchronizing local data with remote locations. In this edition of the On Call Compliance Solutions Compliance Tip of the Week, we discuss how to control the connection of a mobile device.Ī mobile device is a computing device that has a small form factor such that it can easily be carried by a single individual is designed to operate without a physical connection (e.g., wirelessly transmit or receive information) possesses local, non-removable or removable data storage and includes a self-contained power source. YouTube – NIST 800-171 Control 3.1.18 - Control connection of mobile devices.This article provides companies with ideas on how to mitigate the risk that mobiles carry with them as attackers turn to target them. The Missing Report – Phone Security: 20 Ways to Secure Your Mobile Phone.Some simple steps to keep you and your devices safe and secure. You will learn how to pen test the biggest attack surface in your organization dive deep into evaluating mobile apps and operating systems and their associated infrastructure and better defend your organization against the onslaught of mobile device attacks. This SANS course will prepare you to effectively evaluate the security of iOS and Android mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test, which are all critical skills required to protect and defend mobile device deployments. SANS – SEC575: iOS and Android Application Security Analysis and Penetration Testing.In this course, you'll learn what mobile device management (MDM) is, and how it can be used to secure your environment and create a great user experience. Pluralsight – Mobile Device Management – The Big Picture.This NIST Special Publication helps organizations centrally manage and secure mobile devices against a variety of threats. NIST SP 800-124 Guidelines for Managing the Security of Mobile Devices in the Enterprise.The NCCoE mobile device security efforts are dedicated to solving businesses most pressing mobile cybersecurity challenges. You control how your organization’s devices are used, including mobile phones, tablets, and laptops. Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). Microsoft – Microsoft Intune securely manages identities, manages apps, and manages devices. ![]() This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2. This article from CIO provides seven best practices to help companies secure their mobile envrionments. CIO – 7 Enterprise Mobile Security Best Practices.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |