{{ searchResult.published_at | date:'d MMMM yyyy' }}

Loading ...
Loading ...

Enter a search term such as “mobile analytics” or browse our content using the filters above.

No_results

That’s not only a poor Scrabble score but we also couldn’t find any results matching “”.
Check your spelling or try broadening your search.

Logo_distressed

Sorry about this, there is a problem with our search at the moment.
Please try again later.

As several surveys highlight the shocking inadequacy of wireless security deployments in the City of London, the BS7799 specialist IT Governance Ltd today launches two Complete Security Toolkits to help busy Information Security Managers quickly get on top of endpoint security.

These two Complete Security Toolkits (PDA Security; Securing Wireless on the Road) are exclusively available through www.itgovernancesales.co.uk. They are comprehensive. Each contains a business briefing on the threats and risks that you need to address, a risk assessment tool that identifies the specific risks relating to your specified assets, a technology briefing that identifies the range of relevant technology solutions and controls, pre-written policies and end user agreements, and a staff training module that can be adapted for any organization’s requirements.

In a nutshell, a Complete Security Toolkit enables the busy Information Security Manager to go overnight from worrying about wireless insecurity to implementing an appropriate solution.

While these toolkits are appropriate in any business that deploys wireless laptops, mobile phones or PDAs, they are particularly suitable for young, fast-growing Internet and e-commerce businesses that leverage all the most modern technologies – because wireless laptops, mobile phones and PDAs have, out of the box, little or no security.

These devices are pre-configured for quick deployment: they are deliberately set up to be completely insecure. HotSpots, which are a great workplace, are also a hotbed for criminals. Organized crime, spammers, virus writers and hackers can infiltrate and attack your e-commerce backend - where all the valuable data is stored - through any insecure endpoint device – wireless laptop, PDA or SmartPhone.

IT Governance consultants can help organizations tackle wireless security, but organizations could deal with it more quickly and far less expensively themselves. And smaller businesses almost certainly won’t want to afford any of the consultants who really know what they’re doing. But the issue is pressing: organized crime won’t postpone its attacks until after their targets are secure – and business survival depends on our e-commerce and computing systems.
The wireless Complete Security Toolkits are exclusively downloadable from www.itgovernancesales.co.uk.

IT Governance Ltd is a specialist information security, risk management and governance consultancy business, based in Ely, in the UK’s Cambridgeshire ‘silicon fen’.

Alan Calder is a founder director of IT Governance Ltd. His books include:
IT Governance: a Manager’s Guide to Data Security and BS7799/ISO17799
IT Governance: Guidelines for Directors
The NON-Geek Guide to Wireless Security
The ABCs of Information Security

IT Governance Ltd
66 Silver Street
Ely
Cambs CB7 4JB
www.itgovernance.co.uk
T: + 44 1353 659662
F: + 44 1353 662667

Published on: 12:00AM on 15th March 2005