People are the weakest link

RedCannon Security, a provider of secure mobile-access solutions, recently jumped on the public-relations bandwagon with its release of Six Laws of Mobile Security.

The six laws, in brief form, are:

1. Define acceptable use.

2. Educate employees frequently.

3. Manage mobile devices centrally.

4. Encrypt mobile data.

5. Control ports.

6. Secure remote access.

Although RedCannon's list is reasonable, it seems to us that the effort to secure data is in many ways much like the effort to secure the country. Specifically, there are some things you have to do simply because you'd be charged with gross negligence if you didn't do them. Encrypting mobile data is one of those. And screening airline passengers is another. But technical measures only cause hackers and terrorists to shift their targets and tactics. As is reflected in RedCannon's first two laws, the weakest link always seems to be people.

So when was the last time you were briefed on data security at your workplace?

About the Author

Patrick Marshall is a freelance technology writer for GCN.


  • business meeting (Monkey Business Images/

    Civic tech volunteers help states with legacy systems

    As COVID-19 exposed vulnerabilities in state and local government IT systems, the newly formed U.S. Digital Response stepped in to help. Its successes offer insight into existing barriers and the future of the civic tech movement.

  • data analytics (

    More visible data helps drive DOD decision-making

    CDOs in the Defense Department are opening up their data to take advantage of artificial intelligence and machine learning tools that help surface insights and improve decision-making.

Stay Connected