dcsimg

Ten Approaches to Protecting Mobile Data

  • Ten Approaches to Protecting Mobile Data-

    Proper Session Management

    A number of steps must be taken: Distrust of the client should be the default setting; encryption should be complete; sessions should terminate if not used in a limited amount of time; a secret should be shared between client and server; a request’s validity should be of limited duration; requests should not be allowed to automatically repeat or modify requests.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12

Ten Approaches to Protecting Mobile Data

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
  • Ten Approaches to Protecting Mobile Data-8

    Proper Session Management

    A number of steps must be taken: Distrust of the client should be the default setting; encryption should be complete; sessions should terminate if not used in a limited amount of time; a secret should be shared between client and server; a request’s validity should be of limited duration; requests should not be allowed to automatically repeat or modify requests.

Mobility exploded onto the business scene during the past decade and, needless to say, is here to stay. Now, important and sensitive tasks are as likely to be performed on smartphones, tablets and other non-PC devices as on big machines sitting on office desks.

Security has been a bit of a game of catch up. It is complicated by a couple of ongoing challenges: Like diet and exercise, people (and the companies for which they work) pay lip service to good security practice, but usually skimp, forget or get lazy. On top of that, the emergence of bring-your-own-device (BYOD) approaches complicated things significantly.

But great progress has been made. SNS Research reported in September that the investment in mobile device and network security in 2013 alone will be $9 billion. This slideshow covers some of the latest techniques and approaches to bolstering mobile data security.