Quantcast
Channel: ISOC » Best Practice
Viewing all articles
Browse latest Browse all 4

A Focus on People: Wireless, Mobile Device Management, and More

$
0
0
Articles_SocialEngineering

The University’s Cyber-security Program has a strong focus on technical safeguards – tools and techniques – to reduce the likelihood of a data breach by selecting, purchasing, and implementing security products and services to protect critical university resources and information.  We are always applying the latest security control measure to technology at the University.

However, we can’t underestimate the importance of human safeguards.  People are often the greatest link in the chain.  People can also be the most vulnerable link without the proper access to knowledge.  Ongoing industry reports show that there have been countless data breaches caused by individuals opening e-mails from unknown sources, unknowingly connecting to websites that store malware, disclosing their passwords to individuals pretending to help, or even losing their mobile device without implementing simple safeguards.

With so many people now joining the mobile generation, it’s no surprise that malware is on the rise for mobile devices.  Why?  Mobile devices are pocket-sized computers.  They contain all if not more of what we currently have on our desktops and laptops.  Both Apple and Android devices are at risk, but “[as with] Windows for PCs in the 1990s, Android has quickly become the heart of a thriving ecosystem of hardware, software and services.  As with Windows, there are few barriers to participation in this ecosystem. And, as with Windows, the platform has gained market leadership faster than it has implemented strong security” (Sophos’s “Not Just for PCs Anymore: The Rise of Mobile Malware”).

In addition, “32% of all mobile threats steal information” (Symantec’s 2013 Internet Security Threat Report)

Whatever technology you are using, you may run the risk of becoming a victim of cybercrime if the proper security controls aren’t in place.  Most security controls are simple to apply, such as a password lock on your mobile device or computer.  Other security controls may require some additional research and support (e.g., 2-step login, encrypted data plans, etc.), but are worth the extra time and, in some cases, money.

It’s important to realize that no amount of technology can prevent a data breach if the person using the technology isn’t careful in considering what, when, and how they are accessing data.

Ensure you’re secure

  • Check out Logan Kugler’s “9 Ways to Keep Your Mobile Devices Secure While Traveling” for some general best practices on Mobile Device security.  Kugler’s tips include remembering that downloading unknown Apps can actually put you at risk of malware and considering a password manager system, such as KeePass or 1Password.
  • Check out Stay Safe Online’s “Securing Your Home Network” for advice on controls to put in place at home.

And don’t forget to check out this site for additional tips.  We’ll have upcoming articles on holiday shopping and social network considerations.


Viewing all articles
Browse latest Browse all 4

Trending Articles