Question

An organization has requested that you initiate a discussion with the members of its information technology...

An organization has requested that you initiate a discussion with the members of its information technology department regarding situations in which internal data should become mobile and specify at least four security strategies for mobile data. Initiate a discussion on the four security strategies for mobile devices.

Homework Answers

Answer #1

The four security strategies for mobile devices are as below:

  1. Say no to Public WIFi - The very basic security strategy is to not be tempted to use the public wifi. This is an easy route for the hacker to invade the mobile device and steal confidential data. Staying away from any random public wifi will ensure that the data is safe and not tempered with.
  2. Keeping strong passwords - For any confidential file or document it is suggested to have a strong password to maintain its security. A good use of mix of alpha numeric and allowed special characters should be practiced. Further this should be changed time to time and should not be kept same for a longer period of time.
  3. Having and updated mobile software and apps - An outdated version of apps or mobile software can not protect the threat posed by the hackers. Therefore it is strongly recommended to update all the relevant apps and software. It is also recommend to review the apps and their genuineness. In case of doubt better to uninstall it and seek for an alternate and reliable app.
  4. Maintaining a back up data and remote access- Inspite of all precautions the device may come under hackers target and you may need to delete it remotely to avoid misuse of data. Therefore to enable the remote access of the data can be very useful. In addition it is advisable to always have a back up file of the document to access in case things go out of control.
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Assume an organization is considering global expansion and has asked you, the network administrator, about what...
Assume an organization is considering global expansion and has asked you, the network administrator, about what should be considered with regard to client/server architecture when employing a global expansion strategy. The following are the questions that have been posed: What factors should be considered in deciding which components are needed for the basic network setup? What concerns must the organization address with regard to data security? How could employees or contractors around the world access the data safely? Should the...
Data breaches are commonplace in businesses. In spite of various kinds of software, tools, and other...
Data breaches are commonplace in businesses. In spite of various kinds of software, tools, and other resources used to secure data, the potential for internal and external threats still exist. However, the degree by which data breaches can affect an organization and its customers depends greatly on the response plan the organization has in place to address potential threats. Neglecting to have a plan or having a plan that is inadequate can affect the brand and reputation of the business...
Machine to Machine (M2M) is a direct network technology mostly used between networked devices for exchanging...
Machine to Machine (M2M) is a direct network technology mostly used between networked devices for exchanging data and information to perform specific task without the need of human assistance. M2M technology can be of two types: wired and wireless. Mostly, 2G and 3G networks are more popular. They usually use public network like cellular and Ethernet to keep the cost is a low range. The main function of M2M technology is to access data from sensors and transmit it to...
In July of 2015, your organization, which has maintained a flawless record with the EEOC, was...
In July of 2015, your organization, which has maintained a flawless record with the EEOC, was contacted regarding lack of compliance with EEOC standards. As the Director of Human Resources, you recognize that failing to comply with EEOC regulations is a major problem. Case Alan James, age 57, has been working for Organization X since its beginning in 1988. Alan is a hard worker who is dedicated to personal and organizational success. Since the company’s beginning, Alan has worked his...
MANAGEMENT INFORMATION SYSTEMS Debate has emerged and raged on regarding many African countries including Ghana not...
MANAGEMENT INFORMATION SYSTEMS Debate has emerged and raged on regarding many African countries including Ghana not making rapid economic progress in an emerging knowledge economy. Poverty exists in spite of development being driven by technology, fuelled by information and powered by knowledge, and, many are oblivious to the reality that information and communication technology (ICT) cuts across all aspects of our lives. We take a queue from the ICT driven economic experiences of the United States during the dot com...
mperial Devices (ID) has offered to supply the state government with one model of its security...
mperial Devices (ID) has offered to supply the state government with one model of its security screening device at “cost plus 20 percent.” ID operates a manufacturing plant that can produce 66,000 devices per year, but it normally produces 60,000. The costs to produce 60,000 devices follow: Total Cost Cost per Device Production costs: Materials $ 4,500,000 $ 75 Labor 9,000,000 150 Supplies and other costs that will vary with production 2,700,000 45 Indirect cost that will not vary with...
Review the discussions below and reply your thoughts on each discussion: Discussion 1 I believe there...
Review the discussions below and reply your thoughts on each discussion: Discussion 1 I believe there are many reasons why the knowledge-doing gap has become so common within organizations. For one, I feel that many are faced with obstacles that require some thinking outside the box. Sometimes, you may have to take some steps outside the normal regimen to figure new approaches to solving a problem, and some can be either uncomfortable with this approach or simply unaware of where...
The chapter 22 team discussion problem is presented below. If your team has three members, complete...
The chapter 22 team discussion problem is presented below. If your team has three members, complete part 1 only; each team member should prepare a budgeted income statement for a different month (April, May, or June). If your team has four members, complete parts 1 and 2; the first three team members will complete part 1 (April, May, and June, respectively), and the fourth team member will complete part 2. The problem is reproduced below. For full credit on part...
Assume CAPM holds and you have the following information regarding three investment opportunities: Project 1 has...
Assume CAPM holds and you have the following information regarding three investment opportunities: Project 1 has a project beta of 2.0 and you have estimated that the project’s NPV using a cost of capital of 20% equals zero. Project 2 has a project beta of 1.5 and its NPV using a cost of capital of 10% equals zero. Project 3 has a project beta of 1.0 and its NPV equals zero using a cost of capital of 6%. None of...
Assume CAPM holds and you have the following information regarding three investment opportunities: Project 1 has...
Assume CAPM holds and you have the following information regarding three investment opportunities: Project 1 has a project beta of 2.0 and you have estimated that the project’s NPV using a cost of capital of 20% equals zero. Project 2 has a project beta of 1.5 and its NPV using a cost of capital of 10% equals zero. Lastly, project 3 has a project beta of 1.0 and its NPV equals zero using a cost of capital of 6%. None...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT