Monday, April 1, 2013

X Blogs - The Series - Part 3

(Story continues from X Blogs - The Series - Part 2)
X-Blogs Series Part 3: Coffee with Mr. X | Basic Mobile security concepts

Mr. Joshi: Alright, so you wanted to know more about securing your mobile phone.

Mr. Sibbal: Yes, I wanted to learn about mobile security.

Mr. Joshi: There seems some confusing with the naming here. When we say mobile security, it’s not just about security for your mobile phones. Mobile Security also includes security for the all moveable client devices that might be accessing information remotely.  But since your requirement is personally about securing your smartphone, we should be talking about that only.
  1. Personal Identification Number (PIN): Always protect your phone with the inbuilt security using PIN numbers.
  2. Installing new apps: When you install new apps on your phone, make sure the apps are downloaded from some trusted and secure source. This increase phone safety, and makes sure that the apps are not sending your personal data stored in your phone to some external sites.
  3. Install updates regularly: The OS makers know the loopholes in your OS, and keep sending the security patches often.   So the updates recommended by your phone’s OS should be applied immediately.
  4. Protection against lost or stolen phone: Make sure your phone has some smart features capable of revealing themselves at your will. You can use those features, like tracking the location over internet, theft alarms etc. in case your device is lost or stolen.

Mr. Thakur: Regarding this, I have also written a good blog post, which tells you about the three best security applications for your smartphone.

Mr. Sibbal: Oh, I would love to read that blog.

Mr. Thakur: Oh sure, I’ll share it with you.

Mr. Mahalik: Besides that, talking about mobile security at enterprise level, there are few more considerations. For instance, if suppose an organization like Advaiya wants to define new mobile device policy to allow use of personal mobile phones, they need to have the following considerations for implementing Enterprise Level Mobile Device Security Policies in their organization:
  •  They need to decide about the users who would be allowed to connect to the network.
  •  They need to ensure adequate and updated antivirus protection
  •  They must adhere to new developments, updating the policy, software and hardware as necessary (e.g. when a member of staff leaves).
  • They should emphasis on providing specific services to those who need it on the basis of sound business requirements. 

Mr. Sibbal: I think this again went from above my head. Did not understood much what you said about “Enterprise Level Mobile Device Security Policies” (Really big words to speak)

Mr. Saxena: So, what else you wanted to know about IT security Mr. Sibbal?

Mr. Sibbal: Oh, I also wanted to explore more about Database security, System Security, and Firewalls…

Ms. Chaudhary: But Mr. Sibbal, I am afraid we won’t be able to spare so much time for all the topics. We are here to work for our Web based application “PhotoMash”, and I need to manage many other tasks as well.

Mr. Sibbal: PhotoMash? What is that?

Mr. Paliwal: That is another web based photo search application that we are developing for another event for Hackethon. More details are strictly confidential.

Mr. Sibbal: Hmm… I really love the kind of job you people do have. I would like to join this organization after a finish my graduation.

Ms. Chaudhary: For this, there is a very simple selection procedure, open for all students. You may try that.

Mr. X: And in case of any problems or guidance required, just let me know. I’ll be there to help you out.

Mr. Sibbal: Thanks a lot Mr. X. Your support was really helpful for me in understanding my assignment topic well. 
(Read the previous blog X Blogs - The Series - Part 2 or the first part X Blogs - The Series - Part 1

No comments:

Post a Comment

Total Pageviews