X-Blogs
Series Part 3: Coffee with Mr. X | Basic Mobile security concepts
Mr. Joshi: Alright, so you wanted to know more about
securing your mobile phone.
Mr. Sibbal: Yes, I wanted to learn about mobile
security.
Mr. Joshi: There seems some confusion with the naming here.
When we say mobile security, it’s not just about security for your mobile
phones. Mobile Security also includes security for all moveable client
devices that might be accessing information remotely. But since your requirement is personally
about securing your smartphone, we should be talking about that only.
Microsoft provides some simple
ways to make sure your smartphones are safe and secure:
- Personal Identification Number (PIN): Always protect your phone with the inbuilt security using PIN numbers.
- Installing new apps: When you install new apps on your phone, make sure the apps are downloaded from some trusted and secure source. This increase phone safety, and makes sure that the apps are not sending your personal data stored in your phone to some external sites.
- Install updates regularly: The OS makers know the loopholes in your OS and keep sending the security patches often. So the updates recommended by your phone’s OS should be applied immediately.
- Protection against lost or stolen phone: Make sure your phone has some smart features capable of revealing themselves at your will. You can use those features, like tracking the location over the internet, theft alarms, etc. in case your device is lost or stolen.
Mr. Thakur: Regarding this, I have also written a good blog
post, which tells you about the three best security applications for your
smartphone.
Mr. Sibbal: Oh, I would love to read that blog.
Mr. Thakur: Oh sure, I’ll share it with you.
Mr. Mahalik: Besides that, talking about mobile security at
enterprise-level, there are few more considerations. For instance, if suppose
an organization like Advaiya wants to define new mobile device policy to allow
use of personal mobile phones, they need to have the following considerations
for implementing Enterprise
Level Mobile Device Security Policies in their organization:
- They need to decide about the users who would be allowed to connect to the network.
- They need to ensure adequate and updated antivirus protection
- They must adhere to new developments, updating the policy, software, and hardware as necessary (e.g. when a member of staff leaves).
- They should emphasis on providing specific services to those who need it on the basis of sound business requirements.
Mr. Sibbal: I think this again went from above my head. Did not
understood much what you said about “Enterprise Level Mobile Device Security
Policies” (Really big words to speak)
Mr. Saxena: So, what else you wanted to know about IT
security Mr. Sibbal?
Mr. Sibbal: Oh, I also wanted to explore more about Database
security, System Security, and Firewalls…
Ms. Chaudhary: But Mr. Sibbal, I am afraid we won’t be able
to spare so much time for all the topics. We are here to work for our Web-based
application “PhotoMash”, and I need to manage many other tasks as well.
Mr. Sibbal: PhotoMash? What is that?
Mr. Paliwal: That is another web-based photo search
application that we are developing for another event for Hackathon. More
details are strictly confidential.
Mr. Sibbal: Hmm… I really love the kind of job you people do
have. I would like to join this organization after I finish my graduation.
Ms. Chaudhary: For this, there is a very simple selection
procedure, open to all students. You may try that.
Mr. X: And in case of any problems or guidance required,
just let me know. I’ll be there to help you out.
Mr. Sibbal: Thanks a lot, Mr. X. Your support was really
helpful for me in understanding my assignment topic well.
(Read the previous blog X Blogs - The Series - Part 2 or the first part X Blogs - The Series - Part 1
(Read the previous blog X Blogs - The Series - Part 2 or the first part X Blogs - The Series - Part 1
No comments:
Post a Comment