Security Basics mailing list archives
Mobile wireless users
From: ttate () ctscorp com
Date: Thu, 26 May 2005 3:29:25 PM+0500
How does your organization secure mobile users? What I am referring to are those users that have company-owned, or managed, mobile wireless resources that they use outside of your organization's wireless network. Traffic to/from those devices at a non-secure location is susceptible to capture and analysis by unknown parties. I understand that a firewall on the mobile device prevents accessing resources *on* that device. I also understand that a vpn will encrypt traffic to/from that device and an organization's private network. But what about those times when the user doesn't turn on the VPN? What about the times they use organization resources that are exposed to the general public and enter private credentials to gain access to those resources? How do you help your wireless users be paranoid about what they are accessing when using wireless access? How do you prepare them to handle various activities that they may want or need to perform using those wireless devices? I appreciate your comments on this issue and hope it will answer some significant questions that my organization has about allowing users to use mobile wireless devices outside of our facilities. Troy Tate Corporate Network Manager CTS Corp. 574-293-7511 x397 574-294-5718 fax
Current thread:
- Mobile wireless users ttate (May 27)
- Re: Mobile wireless users Ashish Popli (May 30)
- <Possible follow-ups>
- RE: Mobile wireless users Gross Barry D. (May 30)
- Re: Mobile wireless users ttate (May 31)
- Re: Mobile wireless users ttate (May 31)