Monday, 22 August 2016 ehdf

Keep Your Company Data Safe by Securing your Mobile Workforce

Owing to its many business benefits, including enhanced productivity, mobile computing has become a fast emerging trend and is growing exponentially. There are, however, measures that organizations need to take to ensure that the company data being accessed outside the office premises is secure and not vulnerable to risks.

Here are a few simple tips to ensure that your mobile workforce stays secure and does not fall into the trap of losing confidential company information:

1.Organizations need to sketch a framework of policies that are detailed, and addresses to a wide range of mobile devices – mobiles, laptops, PDAs, smart phones etc.

2.Create an awareness program to make the policies known within the organization. The staff must be told about the security implications of mobile devices, and what actions will be taken if the policies are ignored

3.Never rely on techniques or products that allow the users to make security decisions. All security settings should be maintained and controlled centrally

4.Do not allow staff to connect their personal devices to the company network. It is a good practice to give them company owned PDAs

5.Another control measure would be to identify who in the company is in need of remote access to company information. An example, out of 100 employees, industry statistics show that only 10 of them really need to access company information remotely

6.Standardize on a few brands of devices and support only a few operating systems. Too many devices and operating systems will multiply your worries!

7.Use a virtual private network (VPN) on top of wired equivalent privacy to connect to the internal network. Keeping one-time passwords for opening VPN connections is a good idea

To summarize, disable unwanted features where possible and enforce best practices where necessary. Ensure users understand the importance of the security policy and are aware of the consequences of bypassing the guidelines and creating a potential or real security breach.

Know More
Monday, 15 August 2016 ehdf

Contending with Legacy IT Infrastructure

CIOs are forever being told that they need to make their IT operations more agile, and better able to respond to changes in the market. However, that’s...

Know More
Monday, 8 August 2016 ehdf

Adoption of Cloud Infrastructure Services in the Middle East

Infrastructure-as-a-Service helps organizations re-allocate their time and resources, by making their IT infrastructure smarter and more flexible. This...

Know More
Monday, 1 August 2016 ehdf

Selecting Your Strategic Data Center Partner

Every Data Center has its share of strengths and characteristics that is the sum of its capital investments and innovative way of operations. An end-customer...

Know More