Desktop Security Policy Enforcement - How to Secure Your Corporate Mobile Devices

    Date01 Sep 2006
    Posted ByBrittany Day
    Desktop security can have many meanings depending on whose definition is being used. Ask a common user what their definition of desktop security is and you may get responses such as anti-virus software is installed or username and password authentication is in place. That user will probably be the same one that turns around and disables the anti-virus software because it slowed down their machine too much and will write their username and password on a post it and put it under their keyboard. Pose the same question to members of management and you may have gotten a response such as the corporation These cuts will be justified because there have not been any serious breaches or data losses before and the return on investment based on prior history may not justify the costs. With newspaper headlines that uncover sensitive personal information theft due to lax corporate security measures becoming more common place, desktop security is coming to the forefront as a necessary aspect of the corporate security policy. Corporate security policies are redefining what is required to secure the desktop that once was a stationary item and all that was needed was anti-virus and a corporate firewall to protect. With higher corporate productivity becoming directly attributed to the degree of mobility afforded through advanced information technology, the need for more in-depth security measures that can handle advanced threats to mobile devices is needed.

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Which email threat are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"81","title":"Ransomware","votes":"3","type":"x","order":"1","pct":75,"resources":[]},{"id":"82","title":"Business email compromise ","votes":"1","type":"x","order":"2","pct":25,"resources":[]},{"id":"83","title":"Spam email","votes":"0","type":"x","order":"3","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.