Endpoint Security

From laptops to cellphones, organizations have to keep track of data on more devices than ever, and more devices means more risk. That's why its important to implement Enterprise Mobility Management (EMM) tools and policies.

Inherent Risks and Practical Policies

No automated security system or protocol can make a system fully secure if those with legitimate access exploit it for illegitimate purposes or if a device falls into the wrong hands. Here are some general "common sense" guidelines you should follow when it comes to endpoint security:

Use good mobile device management (MDM) software. MDM systems can help your organization secure the devices where its sensitive data might end up.

Grant security permission conservatively. Don't give everyone permission to everything just to avoid perceived complexity. Remember, one breach can be many times more costly and time consuming than setting and following standard security protocols.

Organize permission sets and credentials so they can be edited quickly. Keep user groups and their permissions organized and easy to manage. Use descriptive names for permission sets, and organize them logically to make it easier for you or anyone else to manage them quickly and confidently.

Keep up with organizational changes. If a user no longer needs access to a part of the app, for whatever reason, update that user's permissions accordingly.

Use timeout settings. Administrators can limit how long mobile apps and APIs remain connected to the server after a user signs in. Configure authentication timeout settings to help minimize access if a device does fall into the wrong hands.



Last Published Wednesday, March 20, 2024