Security+: Deploying Mobile Devices Securely – 5 Top Tips

Introduction

The Security+ cert is one of the most well regarded and entry-level types of credentials that a Cybersecurity specialist can obtain. The exam covers a wide spectrum of topics, which include the following:

  • The ability to deploy and configure a wide number of security applications;
  • The general concepts behind network infrastructure design and installation;
  • How to perform a basic survey of the Cybersecurity threat landscape;
  • How to respond to actual Cyber-attacks with the right and appropriate countermeasures;
  • The keen awareness of being up to date with the latest tools to combat Cyber threats;
  • An overall understanding of the various legislations, mandates, laws, as well as mandates that are in existence and enforced in the overall Cybersecurity
  • A good grasp of the fundamentals of the principles of Confidentiality, Availability, and Integrity (the CIA Triad)

As we all know, mobile devices have become not an integral part of the workplace, but even in society. Therefore, the safe deployment of these devices is of paramount importance not just for individuals, but businesses and corporations, government agencies, as well as other entities. In fact, the topics that are covered by the Security+ cert are very relevant to mobile devices.

For example:

  • Mobile devices have indeed become an integral part of any corporate network; as many employees, these days now log in from their Smartphone to access shared files and other types of resources.
  • In fact, mobile devices have become the prime target for the Cyber attacker today. Thus, an understanding of the risks and threats that are out there and how to combat them proactively is a must.
  • In some industries, such as that of healthcare, employees use their Smartphone to access confidential patient information. Thus, the need to understand the federal laws surrounding the protection of this data is very important, especially (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Ravi Das (writer/revisions editor). Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/Ihjf_9ZOsrI/