Tips for IT Managers

  • Keep on top of software upgrades so security patches can be deployed as they become available.
  • Review vendor Web sites and security-related mailing lists for alerts.
  • Conduct ongoing, random security audits to monitor and track devices and networks.
  • Place physical boundary protection and access controls along the perimeter of the agency's facilities.
  • Ensure that wireless networks aren't used until they comply with the agency's security policy.
  • Ensure that handheld devices are stored securely and that users know where to report losses or theft.
  • Make software on wireless handhelds and networks password-protected.
  • Store data on backup storage modules in encrypted form.
  • Synchronize wireless handheld devices with their corresponding PCs regularly.
  • Turn off communication ports during periods of inactivity.
  • Install anti-virus and firewall software on all handheld devices and wireless networks.
  • When disposing of handheld devices, clear configuration settings to prevent the disclosure of sensitive network information.
  • Use robust encryption and password protection utilities. .
Sources: NIST reports, vendors and government security experts

NEXT STORY: Mapping a More Secure Future