People are the weakest link

RedCannon Security, a provider of secure mobile-access solutions, recently jumped on the public-relations bandwagon with its release of Six Laws of Mobile Security.

The six laws, in brief form, are:

1. Define acceptable use.

2. Educate employees frequently.

3. Manage mobile devices centrally.

4. Encrypt mobile data.

5. Control ports.

6. Secure remote access.

Although RedCannon's list is reasonable, it seems to us that the effort to secure data is in many ways much like the effort to secure the country. Specifically, there are some things you have to do simply because you'd be charged with gross negligence if you didn't do them. Encrypting mobile data is one of those. And screening airline passengers is another. But technical measures only cause hackers and terrorists to shift their targets and tactics. As is reflected in RedCannon's first two laws, the weakest link always seems to be people.

So when was the last time you were briefed on data security at your workplace?

About the Author

Patrick Marshall is a freelance technology writer for GCN.

inside gcn

  • high performance computing (Gorodenkoff/

    Does AI require high-end infrastructure?

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group