Page Two

By Jason Brooks  |  Posted 2005-06-13 Print this article Print

Mobile devices have a way of poking holes through companies IT defenses. However, with smart management, administrators can reduce the vulnerabilities that mobile systems are heir to.

  • Notebooks and handheld computers are easily carried away, and sensitive data can be just as easily carried away with them. Encrypting this data reduces the likelihood that it will fall into the wrong hands.

  • Information that travels over wireless networks can be sniffed, so strong over-the-air encryption—be it through 802.11i, IP Security, SSH (Secure Shell) or SSL—is a must.

  • Weak or compromised authentication will foil even the best encryption schemes Pursue multifactor authentication to ensure the integrity of your security perimeter.

  • Mobile devices can be a vector for malware to enter your network Ensure that roaming systems receive virus and system upgrades, and deploy systems that will deny access to mobile clients that dont meet these requirements.

    Senior Analyst Jason Brooks can be reached at

    Check out eWEEK.coms for the latest news, reviews and analysis on mobile and wireless computing.

    As Editor in Chief of eWEEK Labs, Jason Brooks manages the Labs team and is responsible for eWEEK's print edition. Brooks joined eWEEK in 1999, and has covered wireless networking, office productivity suites, mobile devices, Windows, virtualization, and desktops and notebooks. JasonÔÇÖs coverage is currently focused on Linux and Unix operating systems, open-source software and licensing, cloud computing and Software as a Service. Follow Jason on Twitter at jasonbrooks, or reach him by email at

    Submit a Comment

    Loading Comments...
    Manage your Newsletters: Login   Register My Newsletters

    Rocket Fuel