Security Basics mailing list archives

Mobile wireless users


From: ttate () ctscorp com
Date: Thu, 26 May 2005 3:29:25 PM+0500

How does your organization secure mobile users? What I am referring to are those users that have company-owned, or 
managed, mobile wireless resources that they use outside of your organization's wireless network. Traffic to/from those 
devices at a non-secure location is susceptible to capture and analysis by unknown parties. I understand that a 
firewall on the mobile device prevents accessing resources *on* that device. I also understand that a vpn will encrypt 
traffic to/from that device and an organization's private network. But what about those times when the user doesn't 
turn on the VPN? What about the times they use organization resources that are exposed to the general public and enter 
private credentials to gain access to those resources? How do you help your wireless users be paranoid about what they 
are accessing when using wireless access? How do you prepare them to handle various activities that they may want or 
need to perform using those wireless devices? 
I appreciate your comments on this issue and hope it will answer some significant questions that my organization has 
about allowing users to use mobile wireless devices outside of our facilities.
Troy Tate
Corporate Network Manager
CTS Corp.
574-293-7511 x397
574-294-5718 fax


Current thread: