Tips for IT Managers
- Keep on top of software upgrades so security patches can be deployed as they become available.
- Review vendor Web sites and security-related mailing lists for alerts.
- Conduct ongoing, random security audits to monitor and track devices and networks.
- Place physical boundary protection and access controls along the perimeter of the agency's facilities.
- Ensure that wireless networks aren't used until they comply with the agency's security policy.
- Ensure that handheld devices are stored securely and that users know where to report losses or theft.
- Make software on wireless handhelds and networks password-protected.
- Store data on backup storage modules in encrypted form.
- Synchronize wireless handheld devices with their corresponding PCs regularly.
- Turn off communication ports during periods of inactivity.
- Install anti-virus and firewall software on all handheld devices and wireless networks.
- When disposing of handheld devices, clear configuration settings to prevent the disclosure of sensitive network information.
- Use robust encryption and password protection utilities. .
NEXT STORY: Mapping a More Secure Future




