By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Before you start with any of this, you'll need to perform a risk assessment to document exactly what you're trying to protect on your PDAs along with the associated threats and vulnerabilities. This will help you in establishing your physical security and encryption requirements as well as determine what to include in your security policies and in your training programs for your end users.
- Physical security for PDAs could be considered the weakest link in the PDA information security chain.
- Most, if not all, of the physical security of PDAs is dependent upon the end user (see User Awareness Issues below).
- Must consider possibility of user installing malicious software on PDA via synchronization, infrared beaming, or network access that ultimately finds its way to the inside of your network.
- If it's available, turn on encryption for both data stored on the PDAs as well as data transmitted via wireless. Don't focus so much on encryption algorithms and key lengths. 128-bit encryption is more than enough for now. Consider 3rd party products for encryption above and beyond the built-in options if necessary.
- You may also want to consider using biometric, smart card, or digital certificate authentication add-ons to supplement usernames/passwords for stronger authentication.
- First off, make it policy for your company to purchase the PDAs. This will really help with policy enforcement down the road.
- Key policies to consider are ones that define minimum password complexity, encryption requirements, anti-virus software requirements, physical security requirements, data backup requirements, data ownership, software installation, and what software/data/equipment must be surrendered if questions or conflicts arise.
- Explain to your end users that PDAs are no different, and should be treated no differently than, any other computer that accesses or stores business information.
- Train your users on how to securely use the devices (encryption, logging in, etc.).
- Explain the risks of using PDAs in your business setting Outline the consequences of not adhering to policies Keep them informed and updated on changes.
Dig Deeper on Enterprise mobile security
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.