Organizational Security Policies Measures in Mobile Computing Era, Laptops

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

Organizational security policies

Measures in mobile computing era,


laptops.
Importance of Security Policies relating to
Mobile Computing Devices
• Growth of mobile devices used makes the cybersecurity issue harder than what
we would tend to think.
• People (especially, the youth) have grown so used to their mobiles that they are
treating them like wallets!
• For example, people are storing more types of confidential information on mobile
computing devices than their employers or they themselves know; they listen to
music using their hand-held devices
• One should think about not to keep credit card and bank account numbers,
passwords, confidential E-Mails and strategic information about organization.
• Imagine the business impact if mobile or laptop was lost or stolen, revealing
sensitive customer data such as credit reports, social security numbers (SSNs) and
contact information.
Operating Guidelines for Implementing
Mobile Device Security Policies
• Through the following steps we can reduce the risk when mobile device lost or stolen

• 1. Determine whether the employees in the organization


need to use mobile computing devices or not.
• 2. Implement additional security technologies like strong
encryption, device passwords and physical locks.
• 3. Standardize the mobile computing devices and the
associated security tools being used with them.
• 4. Develop a specific framework for using mobile computing
devices.
Operating Guidelines for Implementing
Mobile Device Security Policies
• 5. Maintain an inventory so that you know who is using what kinds of
devices.
• 6. Establish patching procedures for software on mobile devices.
• 7. Label the devices and register them with a suitable service.
• 8. Establish procedures to disable remote access for any mobile.
• 9. Remove data from computing devices that are not in use
• 10. Provide education and awareness training to personnel using
mobile devices.
Organizational Policies for the Use of Mobile Hand-Held Devices

• There are many ways to handle the matter of creating policy for
mobile devices.
• One way is creating a distinct mobile computing policy.
• Another way is including such devices under existing policy.
Laptops
• Laptops, like other mobile devices, enhance the business functions.
• Their mobile access to information anytime and anywhere, they also pose a large
threat as they are portable.
• Wireless capability in these devices has also raised cybersecurity concerns when
the information being transmitted over other, which makes it hard to detect.
• The thefts of laptops have always been a major issue, according to the
cybersecurity industry and insurance company statistics.
• Cybercriminals are targeting laptops that are expensive, to enable them to fetch a
quick profit in the black market.
• Most laptops contain personal and corporate information that could be sensitive.
• Such information can be misused if found by a malicious user.
• The following section provides some countermeasures against the theft of laptops,
thereby avoiding cybersecurity exposures.
Physical Security Countermeasures

• Organizations are heavily dependent upon a mobile workforce with


access to information, no matter where they travel.
• However, this mobility is putting organizations at risk of having a data
breach (Violation) if a laptop containing sensitive information is lost or
stolen.
• Hence, physical security is very important to protect the information
on the employees’ laptops.
Physical Security Countermeasures
• Physical security countermeasures are as follows.
• 1. Cables and hardwired locks: The most cost-efficient and ideal solution to
safeguard any mobile device is securing with cables and locks, specially designed
for laptops.
• 2. Laptop safes: Safes made of polycarbonate – the same material that is used in
bulletproof windows, police riot shields and bank security screens – can be used to
carry and safeguard the laptops
• 3. Motion sensors and alarms: Alarms and motion sensors are very efficient in
securing laptops.
• 4. Warning labels and stamps: Warning labels containing tracking information and
identification details can be fixed onto the laptop to deter aspiring thieves. These
labels cannot be removed easily and are a low-cost solution to a laptop theft.
Other measures for Protecting laptops
• keeping the laptop close to oneself wherever possible.
• Carrying the laptop in a different and unobvious bag
• Creating the awareness among the employees about the sensitive
information contained in the laptop.
• Making a copy of the purchase receipt of laptop.
• Installing encryption software to protect information stored on the
laptop
• Using personal firewall software to block unwanted access and intrusion.
• Updating the antivirus software regularly.
• Tight office security using security guards and securing the laptop by
locking it down in lockers when not in use.
Other measures for Protecting laptops
• Never leaving the laptop unattended in public places.
• Disabling IR ports and wireless cards when not in use.
• Choosing a secure OS.
• Registering the laptop with the laptop manufacturer to track down
the laptop in case of theft.
• Disabling unnecessary user accounts and renaming the administrator
account.
• Backing up data on a regular basis.
Other measures for Protecting laptops
• A few logical access controls are as follows:
• 1. Protecting from malicious programs/attackers/social engineering.
• 2. Avoiding weak passwords/open access.
• 3. Monitoring application security and scanning for vulnerabilities.
• 4. Ensuring that unencrypted data/unprotected file systems do not
pose threats.
• 5.Proper handling of removable drives/storage mediums/unnecessary
ports.
Other measures for Protecting laptops
• 6. Password protection through appropriate passwords rules and use
of strong passwords.
• 7. Locking down unwanted ports/devices.
• 8. Regularly installing security patches and updates.
• 9. Installing antivirus software/firewalls/intrusion detection system
(IDSs).
• 10. Encrypting critical file systems.
Spy Phone Software

• Spy Phone software is installed on the mobile/cell phone of employees, if the


employers wants to monitor phone usage. The Spy Phone software is
completely hidden from the user, once it is installed and collects all the
available data such as SMS messages, ingoing/outgoing call history, location
tracking, GPRS usage and uploads the collected data to a remote server.
• The employer can simply access the designated website hosted by Spy Phone
vendor, and after entering his/her account details, he/she can have full access
to all the data collected 24 hours a day, 7 days a week. The employer can access
this website through the Internet; hence, he/she can keep an eye on their
employees, regardless where he/she is in the world. The employer can read all
SMS messages (both incoming and outgoing), know who they (employees) are
calling or who is calling them and where they were when the call was received.

You might also like