Risk Mitigation
Several risk-mitigation methods can be applied to mobile devices and Wi-Fi clients to address the wide variety of threats discussed in the previous section. Typically, the worst-case scenario is a lost or stolen device that is completely vulnerable. The practices for protecting data on corporate-liable devices involve encryption, wiping lost devices, and remote locking. These practices are also necessary when employee-liable devices are allowed to access and download company data. Therefore, they should be considered mandatory when developing a BYOD or corporate owned personally enabled (COPE) strategy.
The key methods to consider are as follows:
- Mobile device screen locks and password protection—These are the first line of ...
Get Wireless and Mobile Device Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.