Mobile and Wireless Devices
Keeping your staff as productive as possible is a key component of any successful business. Over the years the evolution of technology has driven a culture of often pushing staff to their limits. Staff often feel they simply cannot unwind from the burden of technology around them – smart phones, laptops & tablets, 3G/4G internet connectivity, wifi at home, wifi in a café, wifi in an airport and of course remote access to the company network. Mobile devices are a key area of a business’s success and therefore a key component to get right.
Our experience has led us to believe that some staff nowadays expect this drive from a business and so they are open to technology, open to working a non 9 to 5 day and in particular open to a vast variety of mobile and wireless technology to work with.
Because staff requirements, needs and comfort are important to you, you need to have the right security around your mobile and wireless fleet. Any staff member who is entertained while using their mobile technology and at the very same time working remotely in a safe and secure way – must be great for business!
At Cautio we review all of the different mobile technologies you use.
- Full network scanning – establish existing wireless “footprint”
- Password security and authentication
- Wireless infrastructure security (corporate versus guest versus public)
- Network segregation (what other data can be viewed on the wireless LAN)
- Security implications of mobile devices, operating systems, applications, monitoring systems and security controls and processes
- Design and Architecture review
- Firewalls/VLAN, Anti virus controls
- Intrusion detection testing
- Rogue Access Points
- Encryption levels – Is data encrypted, what type of encryption?
- Physical device deployment – device locations, can they be physically compromised?
Handheld mobile review includes:
- Synchronisation authentication including log-on and digital certificates
- On-device security and encryption
- Remote disable and wipe
- Software application security (iPhone and Android custom built applications)
- Patch management
- Mobile application review
- Server and transport layers (telco links, testing includes both fixed and wireless)
- Management control processes and policies
Mobile technologies:
- Handheld mobile devices – iPhone, Android, Nokia, Blackberry
- Portable mobile devices – laptops, tablets, iPad
- Wifi, 802.11 (a/b/g/n/i), WiMAX, GSM (Edge, 3G, 4G)
- Enterprise – MS Exchange/Outlook, Android, Apple MobileMe