Steps for Achieving Proper Mobile Security Governance

14.05.2009

* VPN for email and internal network access

* On-device firewall

* AV software

* Latest security patches

Enforcing the baseline security configuration for all devices can help an organization to establish a bottom-line of defense from each device. Similar to an Internet facing device hardening, on-device resources, wireless interfaces, e.g. WiFi, Bluetooth, RFID, wireless printer, and application functions should be minimized to reduce the likelihood of wireless attacks.