Quote:
Originally Posted by Vipergrün
Scott is dead on. Mobile is the fastest growing sector. Those devices should be controlled while on your network and allow them to wiped if compromised. It appears more and more exploits will be attempted via mobile devices. I assume you have to deal with HIPPA compliance. I'd recommend putting something about compliance, take away admin privileges, manage passwords, perimeter security, etc. The dangerous people are on the inside.
|
Amen to that. Not because they are malicious, but because they don't have a flippin' clue. Most of the time anyway.
We do have to deal with HIPPA compliance. Most everyone does not have admin privs. I would rather hand hold every install or log in remotely and do it than allow most users the ability to install or delete anything. We use Xirrus for our wireless and have some pretty good built in security plus third party applications on the wireless and wired side.
No bed alarms. They are moving away from any type of alarm or overhead paging.
I put the mobile security on the plan in the early 2012 timeframe. Our CEO was sold on the Blackberry because of the encryption used during transmission of data, but I am more concerned about a lost phone that someone fogot to lock. Though the Exchange data would be unaccessable within minutes of my being notified all of the IM/Text and personal data would be available for a bit longer.