Cool security tools your mobile workers just might use

As any IT professional knows, enterprise mobile workers typically aren’t as security conscious as, well, IT professionals. Understandable to be sure, but vexing nonetheless!

Poor security practices — ranging from losing mobile devices to failing to use encryption on public Wi-Fi networks — can result in data loss and theft, brand damage, compliance penalties and more.

Sure, you’ve tried to convey to employees the importance of mobile security best practices, over and over and over again. Yet it’s as if they don’t hear you. Most of them, anyway. A few do listen, and that’s why you keep trying — well, that plus not wanting to lose your job over a massive security breach.

Fortunately, if there’s one thing consumerization of the enterprise has proven, it’s that employees like technology toys.

Over at CIO.com, Paul Mah has compiled a helpful list of nine “essential tools for the security-conscious mobile worker.” And while it’s true that you can lead a mobile worker to security tools, you can’t make him or her use any of them — it never hurts to try.

Some products — such as the webcam covers or USB port blockers — are decidedly low-tech, but useful. Then there’s the Anonabox Pro, a network router in a little black box that provides dedicated support for Tor, software that evolved from The Onion Project which enables anonymous and secure Internet use.

Another cool mobile security tool is the Gatekeeper 2.0. The GateKeeper is a proximity-based wearable keychain that automatically locks your computer via Bluetooth when you walk away and unlocks it when you return. Users can determine the range that works best for them.

If your mobile users are involved in a lot of video conference calls on the road, the Logitech 4K Pro Webcam comes with login and authentication functionality designed to improve security while easing use for road warriors.

Mah covers a few other mobile security tools that could help enterprise employees do a better job of protecting devices and data. If only they would use them.

RELATED LINKS

Clouds cast long security shadow over enterprise IT

What’s ahead for security and cloud adoption?

Wishful thinking is not a mobile security strategy

Trackbacks

  1. […] Cool security tools your mobile workers just might use […]

    Like

  2. […] Cool security tools your mobile workers just might use […]

    Like

  3. […] Cool security tools your mobile workers just might use […]

    Like

  4. […] Cool security tools your mobile workers just might use […]

    Like

  5. […] Cool security tools your mobile workers just might use […]

    Like

  6. […] Cool security tools your mobile workers just might use […]

    Like

  7. […] Cool security tools your mobile workers just might use […]

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: