15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

and work on all the devices used in your corporate network. In a

heterogeneous real-world infrastructure, because there may be a variety of

mobile devices from different vendors using different operating systems, a

one-size-fits-all anti-malware solution probably won’t work. Multiple

solutions may be necessary for the different devices present on a network, or

different modules covering specific types of device may be available from the

vendor to integrate with an enterprise-level anti-malware solution.

In any case, the most important part of an enterprise-level anti-malware

solution is delivering timely updates to the devices on a routine basis.

Network access-control solutions can ensure a device is checked for the latest

anti-malware signatures and updated as necessary when it attempts to connect

to the network. In the case of user-managed devices, you may need policy,

network access-control, and other technical solutions to ensure users are

updating their own devices in a timely manner.

Dealing with Loss

The best way to make sure you’re ready to survive losing a mobile device is

to assume it’s inevitable. Say it to yourself: every mobile device will get lost

at least once. I hope most of your users will prove you wrong, but the odds

are good we’ll all misplace every device we own at least once. Most of us

will be lucky and find it right where we left it, but it could just as easily go

the other way.

When you start with the assumption that your device will end up at the

mercy, kindness, or ignorance of strangers at least once, it’s obvious: you

should protect your data from access by putting a good passcode lock or

screen lock on the device. Most mobile devices enable you to set a passcode

lock or screen lock through Settings (see Figure 25-10). Do it right now!

There are many types of these locks; the most common require you to input a

password, PIN, pattern, fingerprint, or successful facial recognition to unlock

the mobile device so you can use it. Modern iOS and Android use full device

encryption to protect the built-in storage, so even a “finder” who dismantles

the device to access the drive will not get your documents.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!