Laptop and roving Technology |
|
One of the most prevalent forms of introducing security vulnerabilities into an enterprise network is by the introduction of unsecured roving technology. Telecommuters, travelling staff, and visitors can all inadvertently infect a corporate network. Internet related threats such as Trojans, viruses, and malware, on their way to the corporate network, initially infect unsecured technology such as:
- Laptops.
- PDAs.
- Blackberries, particularly with text messaging fully implemented.
- Removable memory sticks.
- CDs.
- DVDs.
|
|
Methodology
ERE performs a security audit on roving technology by manually assessing the security configuration of a sample of devices while on site at a client’s premises. We suggest that the client implement the recommendations in the audit report across the rest of the population of technology, as appropriate.
|
|
|
Contact Us
905 764 3246
|
|
|
|
|