Pub. 9 2020 Issue 2

l e a d i n g a d v o c a t e f o r t h e b a n k i n g i n d u s t r y i n k a n s a s 26 MOBILE DEVICE SECURITY By Andrew Hettick, SSCP, Security+, ISACA Cybersecurity Fundamentals A s technology has advanced, it has grown to a place where employees are able to stay connected to their work, even after clocking out for the day. Employees can use their laptops, phones, and tablets to continue working or to respond to emails. This is a great aspect for better communication and increasing productivity; however, the security of these devices can get overlooked. A small percentage of companies supply mobile devices for their employees, but a vast majority of employees bring their own devices. The challenge many companies face is how to secure those devices to protect the sensitive information that is stored on the device or is accessible on it. The key to ensuring security on these devices is to use a mobile device management solution. When employees need to have access to sensitive information, adding the device to the mobile device manager will require certain security policies to be enforced. There are several solutions that can be used to enforce security settings. The most common is Microsoft Exchange ActiveSync. A few others include IBM MaaS360, Cisco Meraki Systems Manager, and VMware AirWatch. At

RkJQdWJsaXNoZXIy OTM0Njg2