{"id":43,"date":"2004-01-21T00:00:00","date_gmt":"2004-01-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/21\/an-it-manager\/"},"modified":"2021-12-30T11:36:22","modified_gmt":"2021-12-30T11:36:22","slug":"an-it-manager","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/21\/an-it-manager\/","title":{"rendered":"An IT Manager"},"content":{"rendered":"<p>Most board directors clam-up and switch off at the words &#8220;Your Company could be at risk if you don&#8217;t invest in XYZ technology&#8221;.  This was made very clear in the Mobile Usage Survey conducted by Infosecurity and Pointsec which found that a third of users don&#8217;t both protecting their mobile device with password even though they store highly confidential company and personal information on them including all their other passwords, Pin numbers and bank details.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Surveys show that any large organisation lose between 3-5% of their laptops every year.<\/p>\n<p>Relaying laptop theft stories in the local pub is almost as common-place as people boasting how much their houses have shot-up in price over the last two years.  However, with an increasingly mobile workforce, often using privately bought mobile devices, the board and IT departments have to take greater notice of who is carrying what around with them and take a rain check of the damage that could be caused if this information was lost and broadcast to the outside world.<\/p>\n<p>[i]One[\/i] You must have a mobile Use policy or ensure that your corporate IT security policy has specific provision for mobile devices and you update it whenever you adopt new hardware categories such as combined PDA\/phones.<br \/>\n[i]Two[\/i] Take the responsibility of IT security away from the end-user and centrally manage and deploy it.<br \/>\n[i]Three[\/i] Invest in a solution which is usable and flexible.<br \/>\n[i]Four[\/i] Have a blanket approach to security by owning every mobile device that leaves your office and make access control and encryption mandatory.<br \/>\n[i]Five[\/i] Be realistic with passwords<br \/>\n[i]Six[\/i] Become a realist<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-43","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/43","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=43"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/43\/revisions"}],"predecessor-version":[{"id":2530,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/43\/revisions\/2530"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=43"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=43"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=43"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}