Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:44 PM
Keith Ferrell
Keith Ferrell

Mobile Security: The Data, Not The Notebook Is The Asset

Stolen laptops and notebooks continue to get a lot of attention when a lot of confidential data gets stolen along with the device.

Stolen laptops and notebooks continue to get a lot of attention when a lot of confidential data gets stolen along with the device.Which ought to make you wonder why all that data is on all those laptops and notebooks in the first place.

The real challenges of mobile security and mobile device management need to include blunt and hard-nosed consideration of just how much information your employees need on those mobile devices -- and at the same time taking an equally hard look at why they need (or think they need) that data.

Addressing those issues first can open your eyes -- and maybe change your business approach to mobile device security.

Bearing in mind that mobile device users put data at risk more often than desk-bound users, you may well find that data residing on mobile devices is a business risk too large to take.

Clearly, there are employees -- and jobs -- that absolutely require resident data that travels with the worker. Most, I would bet, don't.

If the reason for data on mobile devices is primarily one of convenience for the employee -- or even increased employee efficiency on the road -- it's time for a re-think, and probably a re-configuration that keeps the data on your network and requires the employee to access it there.

That way if the notebook or laptop gets stolen, you're out some hardware and some money -- not material that can put your business itself at risk.

To paraphrase the philosopher Peter Clemenza: "Take the laptop, leave the data."

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: It's the latest version of antivirus.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-02
ZNC before 1.8.1-rc1 allows attackers to trigger an application crash (with a NULL pointer dereference) if echo-message is not enabled and there is no network.
PUBLISHED: 2020-06-02
An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a us...
PUBLISHED: 2020-06-02
common.php in the Gravity Forms plugin before 2.4.9 for WordPress can leak hashed passwords because user_pass is not considered a special case for a $current_user->get($property) call.
PUBLISHED: 2020-06-02
In Joomla! before 3.9.19, missing token checks in com_postinstall lead to CSRF.
PUBLISHED: 2020-06-02
In Joomla! before 3.9.19, lack of input validation in the heading tag option of the "Articles - Newsflash" and "Articles - Categories" modules allows XSS.