Mobile device management in an age of paranoia

By Johna Till Johnson, Network World |  Mobile & Wireless

Worse, options for protection are uncertain. One solution is to require password protection and encryption of sensitive data — but it's unclear at present whether the law requires the arrested individual to enter the password. And what if the device contains automatic links to confidential websites -- in other words, the information that can be accessed resides in the cloud rather than on the device itself? Does law enforcement have the right to view such information? The law doesn't say.

The bottom line? The time to think about managing and protecting mobile devices is now. And your strategy should include appropriate encryption, authentication, and the ability to wipe devices instantly in the event of a breach -- even if that "breach" is created by law enforcement.

Johnson is president and senior founding partner at Nemertes Research, an independent technology research firm. She can be reached at johna@nemertes.com.

Read more about anti-malware in Network World's Anti-malware section.


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness