Check Lists:IT security/Mobile solutions

From PMISwiki
< Check Lists:IT security
Revision as of 19:02, 13 December 2010 by WikiSysop (talk | contribs) (Created page with "As mobile devices is used widely company information and also confidential information gets distributed easily. Remember to evaluate this security risk carefully. =Security chec...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

As mobile devices is used widely company information and also confidential information gets distributed easily. Remember to evaluate this security risk carefully.

Security check list

  • Perform a Security evaluation to determinate the security level needed.
  • Formulate a short and precise security policy, so the user knows:
    • What they are allow to and what they should pay attention to.
    • What they should do if they loss the mobile device (24 hour service?).
  • Ensure that the mobile device is secured with an access code (pin) and an application code if confidential information is stored or available through a network connection.
  • Evaluate if encryption of all data is necessary (don't forget data stored on memory cards).
  • Evaluate if it should be possible to delete all contents from the device if it gets stolen/lost.
  • Anti virus - mobile devices are the next target.
  • Firewall
    • Wireless
    • Access through blue tooth..
    • Access through USB