Mobile devices have become a standard piece of office equipment. Used frequently for temporary storage and accessing large amounts of confidential information in internal systems, it is no longer a question whether they are used but whether they are used securely.
During recent years, mobile devices have developed at a breathtaking pace, and are now as powerful as the workstations of just a few years ago. Mobile devices – tablets or smartphones – provide extensive information accessing and processing capabilities and allow users to communicate effortlessly, establish remote connections and work on the go.
There is no doubt that such flexibility is extremely useful, but it is vital to consider the terms with which these devices should be introduced and used in your office. In many cases, the gains of allowing mobile access to certain information or function must be weighed against the degree of information and system threat exposure.
We have completed numerous assignments related to mobile device security, such as:
- remote management and device profile configuration
- security instructions and terms of accessing classified information with mobile devices
- assessments of acceptable use policies and suggestions for improvement (either for the organisation’s mobile device policy or the entire life cycle)
- connection monitoring and protocol testing
- mobile application security audit
We assess and provide recommendations regarding what can be stored in mobile devices, devices’ suitability for storage, which mobile security methods to use and the terms of storage.