Mobile and Endpoint Security

With an increase in the need for remote work, what cybersecurity administrative control, policies, or safety tips would you suggest for an organization considering or already using this business model? Consider the following in your response:
• Endpoint protection techniques
• Data protection techniques
• The increase in the use the cellular network for internet access
• The use of embedded and specialized devices.
The overall goal is to maintain its security posture without sacrificing the benefits that come with remote access and new ways to access the internet.

This is a discussion Questions Assignment Answer the above prompt and Respond Separately to the Paragraphs below
Week 5 – Discussion – Ramachander
Working in distance is the new vogue in the current era and organizations have adopted this trend ever since the world faced pandemic. Organizations utmost priority is to provide security to its remote assets and thereby secure data. During this course, organizations have to balance security and yet make remote working environment a convenient way.
There are many security measures the organizations should follow, one among those for endpoint security is installing antivirus software on endpoints. This software can examine a computer for file-based virus infections as well as monitor computer activity and scan new documents that might contain a virus. Besides only protecting against file-based viruses with antivirus, organizations also should have antimalware suites of software that are intended to provide protection against multiple types of malwares, such as ransomware, crypto malware, and Trojans. Further, organizations should also use Endpoint detection and response (EDR) tools to aggregate data from multiple office provided endpoint computers to a centralized database so that security professionals can further investigate and gain a better understanding of events occurring across the enterprise endpoints. Organizations also should ensure patch distribution is current on its endpoints, as the threat actors often watch for the release of a patch and then immediately craft an attack around the vulnerability.
Another device that remote workers use for work is the mobile device. Like all endpoints, mobile devise have security vulnerabilities and are at risk of being compromised. Several configurations should be considered when setting up a mobile device for use. These include using strong authentication (strong passcode, restricting unauthorized users with a screen lock), managing encryption, segmenting storage, and enabling loss or theft services. Importantly, when mobile devices are used for work, organizations should use Mobile Device Management (MDM) that allows a device to be managed remotely by an organization. This tool helps organizations apply or modify device settings, detect and restrict jailbreaking, enforce encryption settings, selectively erase corporate data while leaving personal data intact. Similarly, organizations should adopt tools like Mobile Application Management (MAM) that control access to the applications.
Lastly, organizations should take utmost care while using embedded and specialized devices like industrial controls systems (ICSs), unmanned aerial vehicle (UAV), Internet of things (IoTs). These devices must be designed to protect both the device itself and any information contained within the device from unauthorized access, destruction, use, modification, or disclosure.

Ciampa, M. (2022). CompTIA@ Security+ Guide to Network Security Fundamentals, Seventh Edition. Boston: CENGAGE

Wk 5 Discussion
The landscape has changed dramatically since Covid 19 hit the scene. With people working from home more and more, there is an increasing and constant risk to the corporate network. People are connecting remotely and bringing data drives in to plug into their work computer at the office. To bolster the defensive position for the network, I would start by ensuring that there is a current protocol for system checks to ensure that hardware patches and updates are made on the servers and workstations on a regular basis. To promote a safe and connective WFH experience, I would make sure that the VPN network is configured securely, and that encryption is used for every connection. If the organization does not currently have a well-established DMZ, I would also ensure that this is set up and configured to keep a good defensive barrier around the internal network and servers. Every system and computer on the network will need to have antivirus and malware installed and always running and there would need to be a group policy set to ensure that the malware software updates daily. It would be best to be able to provide a well secured computer from which the WFH employees can access the network through a secure VPN connection. From an admin perspective I would like to see the employee user handbook updated to include policies and acceptable behavior for those that are qualified to WFH. In addition, when the employee connects via the VPN connection, I would like to have a clickable UAP message pop up before they are able to connect to the network. Computer malware awareness training would also be a needed mandate for anyone that is cleared to WFH.

Do you need urgent help with this or a similar assignment? We got you. Simply place your order and leave the rest to our experts.

Order Now

Quality Guaranteed!

Written From Scratch.

We Keep Time!

Scroll to Top