436 KB | 3 files | PDF
Organizations should follow these best practices for managing all types of portable devices.
Portable devices like jump drives, personal audio players and tablets give users convenient access to business and personal data on the go. As their use increases, however, so do the associated risks. The properties that make these devices portable and enable them to have on-the-fly connection to various networks and hosts also make them vulnerable to losses of physical control and network security breaches. Using portable devices can increase the risk of data loss (when a physical device is lost) data exposure (when sensitive data is exposed to the public or a third party without consent), and increased exposure to network-based attacks to and from any system the device is connected to (both directly and via networks over the Internet).
This paper focuses on two subsets of portable devices:
Included in this ZIP file are:
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorization of confidentiality of their information. ... More >>
In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise. ... More >>
The management of cryptographic keys is a critical and challenging security management function, especially in the case of a cloud environment. ... More >>