SHARE
Facebook X Pinterest WhatsApp

Companies Should Secure Mobile Workforce, Analysts Say

It could be as simple as a smart phone dropping out of a CEO’s pocket. From there, countless pieces of data fall from a pants pocket into the wrong hands. With that in mind, companies need to secure network access and have the proper procedures in place to secure their mobile workforce, industry insiders said […]

Written By
thumbnail Brian Prince
Brian Prince
Feb 7, 2007
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

It could be as simple as a smart phone dropping out of a CEO’s pocket. From there, countless pieces of data fall from a pants pocket into the wrong hands.

With that in mind, companies need to secure network access and have the proper procedures in place to secure their mobile workforce, industry insiders said at the RSA Conference in early February.

Businesses should have a policy determining what data should be mobile and utilize encryption and other security measures–such as allowing data to be wiped remotely – on mobile devices, said Ron Pon, a senior security architect at Nortel. Pon and Kim Edwards, also from Nortel, offered their advice on best business practices to a room full of attendees at the conference.

Pon said companies should periodically check their policies to ensure they are up-to-date with the latest technologies. Strong authentication procedures are also vital, said Edwards, as is controlling just what is downloaded onto computers connected to the network. Company officials can block downloads all together or simply restrict them to certain applications deemed trustworthy, he said.

But equally as important are the behaviors of the employees themselves.

“It’s very important that when you plug in a device you know where it is coming from,” said Edwards, also a senior security architect at Nortel.

Click here to read more about Samsung’s device management efforts.

Computers should be configured to not automatically install removable hardware, Edwards said, and people should avoid plugging in unknown USB keys. Still, companies need to strike a balance between their security needs and the need of offsite employees to access their business networks.

“You don’t want to build Fort Knox,” Edwards said.

In a separate interview with eWEEK, Kara Hayes of Nokia predicted Feb. 6 that malware attacks against cellular phones will increase as more and more applications are added to the devices.

Network threats are more embedded than in the past, leaving companies in need of a way to detect threats at the application layer without harming the functionality of the network, she said.

“We have very security conscious customers,” said Hayes, who is product marketing manager of Enterprise Solutions Security and Mobile Connectivity.

Edwards and Pon listed a number of ways companies can control access, including the use of VPNs. The two also urged businesses to educate their employees to thwart social engineering attempts by cyber-criminals.

Check out eWEEK.com’s Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK’s Security Watch blog.

Recommended for you...

Manny Rivelo on Evolving Channel & How MSPs Can Get Ahead
Victoria Durgin
Aug 20, 2025
Databricks Raises at $100B+ Valuation on AI Momentum
Allison Francis
Aug 20, 2025
Keepit Achieves SOC 2 Type 1 & Canadian Ingram Micro Deal
Jordan Smith
Aug 20, 2025
AI Customer Service Fails to Satisfy Consumer Needs: Verizon
Franklin Okeke
Aug 19, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.