Question

An organization has requested that you initiate a discussion with the members of its information technology...

An organization has requested that you initiate a discussion with the members of its information technology department regarding situations in which internal data should become mobile and specify at least four security strategies for mobile data. Initiate a discussion on the four security strategies for mobile devices.

Homework Answers

Answer #1

The four security strategies for mobile devices are as below:

  1. Say no to Public WIFi - The very basic security strategy is to not be tempted to use the public wifi. This is an easy route for the hacker to invade the mobile device and steal confidential data. Staying away from any random public wifi will ensure that the data is safe and not tempered with.
  2. Keeping strong passwords - For any confidential file or document it is suggested to have a strong password to maintain its security. A good use of mix of alpha numeric and allowed special characters should be practiced. Further this should be changed time to time and should not be kept same for a longer period of time.
  3. Having and updated mobile software and apps - An outdated version of apps or mobile software can not protect the threat posed by the hackers. Therefore it is strongly recommended to update all the relevant apps and software. It is also recommend to review the apps and their genuineness. In case of doubt better to uninstall it and seek for an alternate and reliable app.
  4. Maintaining a back up data and remote access- Inspite of all precautions the device may come under hackers target and you may need to delete it remotely to avoid misuse of data. Therefore to enable the remote access of the data can be very useful. In addition it is advisable to always have a back up file of the document to access in case things go out of control.
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Machine to Machine (M2M) is a direct network technology mostly used between networked devices for exchanging...
Machine to Machine (M2M) is a direct network technology mostly used between networked devices for exchanging data and information to perform specific task without the need of human assistance. M2M technology can be of two types: wired and wireless. Mostly, 2G and 3G networks are more popular. They usually use public network like cellular and Ethernet to keep the cost is a low range. The main function of M2M technology is to access data from sensors and transmit it to...
In July of 2015, your organization, which has maintained a flawless record with the EEOC, was...
In July of 2015, your organization, which has maintained a flawless record with the EEOC, was contacted regarding lack of compliance with EEOC standards. As the Director of Human Resources, you recognize that failing to comply with EEOC regulations is a major problem. Case Alan James, age 57, has been working for Organization X since its beginning in 1988. Alan is a hard worker who is dedicated to personal and organizational success. Since the company’s beginning, Alan has worked his...
mperial Devices (ID) has offered to supply the state government with one model of its security...
mperial Devices (ID) has offered to supply the state government with one model of its security screening device at “cost plus 20 percent.” ID operates a manufacturing plant that can produce 66,000 devices per year, but it normally produces 60,000. The costs to produce 60,000 devices follow: Total Cost Cost per Device Production costs: Materials $ 4,500,000 $ 75 Labor 9,000,000 150 Supplies and other costs that will vary with production 2,700,000 45 Indirect cost that will not vary with...
The chapter 22 team discussion problem is presented below. If your team has three members, complete...
The chapter 22 team discussion problem is presented below. If your team has three members, complete part 1 only; each team member should prepare a budgeted income statement for a different month (April, May, or June). If your team has four members, complete parts 1 and 2; the first three team members will complete part 1 (April, May, and June, respectively), and the fourth team member will complete part 2. The problem is reproduced below. For full credit on part...
Review the discussions below and reply your thoughts on each discussion: Discussion 1 I believe there...
Review the discussions below and reply your thoughts on each discussion: Discussion 1 I believe there are many reasons why the knowledge-doing gap has become so common within organizations. For one, I feel that many are faced with obstacles that require some thinking outside the box. Sometimes, you may have to take some steps outside the normal regimen to figure new approaches to solving a problem, and some can be either uncomfortable with this approach or simply unaware of where...
Assume CAPM holds and you have the following information regarding three investment opportunities: Project 1 has...
Assume CAPM holds and you have the following information regarding three investment opportunities: Project 1 has a project beta of 2.0 and you have estimated that the project’s NPV using a cost of capital of 20% equals zero. Project 2 has a project beta of 1.5 and its NPV using a cost of capital of 10% equals zero. Project 3 has a project beta of 1.0 and its NPV equals zero using a cost of capital of 6%. None of...
Assume CAPM holds and you have the following information regarding three investment opportunities: Project 1 has...
Assume CAPM holds and you have the following information regarding three investment opportunities: Project 1 has a project beta of 2.0 and you have estimated that the project’s NPV using a cost of capital of 20% equals zero. Project 2 has a project beta of 1.5 and its NPV using a cost of capital of 10% equals zero. Lastly, project 3 has a project beta of 1.0 and its NPV equals zero using a cost of capital of 6%. None...
Real World Case 20.2 ?(Health Information Management and Technology: An applied approach 5th edition, Sayles &...
Real World Case 20.2 ?(Health Information Management and Technology: An applied approach 5th edition, Sayles & Gordon) Review the real world case 20.2. Answer the following questions regarding each case. Be sure to support your answers with detail and specfic responses pertinent to the case. Background ?Maxine has been a coder with the hospital for nearly 15 years. She has been exceedingly loyal and hard working. Her performance record had been outstanding, until this past year. The transition to computer-assisted...
Everybody knows that email is important, but should each company develop, own, support, and maintain its...
Everybody knows that email is important, but should each company develop, own, support, and maintain its own email infrastructure, or should it instead use lower-cost or free services? That is the question that Michael Jagger, CEO of Provident Security, faced as he contemplated a costly upgrade of the company's internal email infrastructure. Founded in 1996 by Michael Jagger as a way to pay his undergraduate tuition, Provident (www. providentsecurity.ca) started out as a company that provided special event security. Today,...
1. Should content providers and advertisers panic because of ad blocking technology, or will consumers figure...
1. Should content providers and advertisers panic because of ad blocking technology, or will consumers figure out that the internet will collapse without advertising revenue? With the rise of Adblockers becoming more significant in everyday use content providers are understandably going to become panicked. From the webpage ‘Native Advertising Institute they explain just how much the use of Adblockers has increased. “eMarketer predicts 1 of every 3 Internet users will use ad blockers by 2017, more than twice the 15%...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT