People are the weakest link

RedCannon Security, a provider of secure mobile-access solutions, recently jumped on the public-relations bandwagon with its release of Six Laws of Mobile Security.

The six laws, in brief form, are:

1. Define acceptable use.

2. Educate employees frequently.

3. Manage mobile devices centrally.

4. Encrypt mobile data.

5. Control ports.

6. Secure remote access.

Although RedCannon's list is reasonable, it seems to us that the effort to secure data is in many ways much like the effort to secure the country. Specifically, there are some things you have to do simply because you'd be charged with gross negligence if you didn't do them. Encrypting mobile data is one of those. And screening airline passengers is another. But technical measures only cause hackers and terrorists to shift their targets and tactics. As is reflected in RedCannon's first two laws, the weakest link always seems to be people.

So when was the last time you were briefed on data security at your workplace?

About the Author

Patrick Marshall is a freelance technology writer for GCN.


  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected