People are the weakest link

RedCannon Security, a provider of secure mobile-access solutions, recently jumped on the public-relations bandwagon with its release of Six Laws of Mobile Security.

The six laws, in brief form, are:

1. Define acceptable use.

2. Educate employees frequently.

3. Manage mobile devices centrally.

4. Encrypt mobile data.

5. Control ports.

6. Secure remote access.

Although RedCannon's list is reasonable, it seems to us that the effort to secure data is in many ways much like the effort to secure the country. Specifically, there are some things you have to do simply because you'd be charged with gross negligence if you didn't do them. Encrypting mobile data is one of those. And screening airline passengers is another. But technical measures only cause hackers and terrorists to shift their targets and tactics. As is reflected in RedCannon's first two laws, the weakest link always seems to be people.

So when was the last time you were briefed on data security at your workplace?

About the Author

Patrick Marshall is a freelance technology writer for GCN.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.