Contact us today!

Best Practices

Best Practices

The following strategies will help you and your Matrix Integration representative develop a plan to secure your network.

Perform a Risk Assessment

Identify where sensitive data is located, who controls it, who and what has access to it, how it is stored and how it is protected.

Implement a Security Policy for Mobile Users

The policy should cover the types of information employees can access, as well as they types of removeable media employees can use.

Train and Educate Employees

Let employees know how to keep company information secure, and the procedure to follow if a device is lost or stolen.

Implement Strong On-Device Security

Anti-virus software is commonplace on notebooks and tablet PCs, but should also be used for other mobile devices such as smartphones and PDAs, especially for devices with network connectivity.

Control the Use of Employee-Owned Devices

Detect and block personal devices or auto-provisioning security software.

Authenticate Users at the Edge of the Network

Authenticate that it is an authorized user AND an authorized device which includes up-to-date security software before granting access to the network.

Centralize Policy Administration and Enforce with Software

Use software that will automate the distribution of security software and policies as they are defined for new users or updated to ensure ongoing compliance.

Control the Flow and Secure Information

Protect enterprise data as it is transmitted to and from the enterprise network using link-level encryption such as Secure Socket Layer (SSL) or Virtual Private Network (VPN) technology.

Balance Security and Accessibility of Information

Automated backup and recovery software can secure company information without interfering with employee access or productivity.