How To Secure and Manage Mobile Computers

Securing and managing mobile computers is a great way to build and improve your customer relationships. It requires regular contact and interaction with clients and their gear. Because your job is to maintain security, you have a valid reason to keep up with your customers' growth and expansion plans -- and to keep a foot in the door to offer more work and services as changing needs indicate.

In the wake of recent, widespread virus infections -- including Blaster and SoBig -- many small and medium businesses (SMBs) have had to clean up their laptops. While most SMBs protect their internal office networks with firewalls and other anti-virus tools, their mobile computers are largely unprotected. Even large companies were vulnerable; some saw entire sales teams forced offline by computer-virus attacks.

Here's your opportunity. As an independent system builder, you can help customers decide which mobile computers need managing, and how those machines can be best managed. Once your customers' laptops are properly secured, you can then establish regular regimens to keep the machines safe and secure. You can also offer "emergency response" services, so that if specific threats or vulnerabilities appear, you can fend them off immediately.

Interested? There are basically two approaches you can take:

id
unit-1659132512259
type
Sponsored post

1. Manual Update: You use remote access to your customers' laptops for updates and management.

2. Automatic Update: You use special-purpose management tools to both track customers' laptops and provide access to "update packages" via e-mail or the Web on an as-needed basis.

I'll explore these two approaches later in this Recipe. But regardless of which approach to laptop management you choose, there are three steps you'll need to follow to get started: First, take an inventory of both your customers' laptop machines and their current security posture. Second, work with your customers to establish a security baseline for their laptops; make sure they're safe from current sources of threat or infection. Third, ensure that proper communications and services are implemented to protect customers' laptops -- and the networks they connect to -- from unauthorized access, eavesdropping, and infections.

Let's dig in. In the sections that follow, you'll find a recipe for laptop management, starting with the required tools and ingredients and continuing with step-by-step instructions for necessary tasks and activities.

Inventory Ingredients

For the initial inventory and security posture analysis, you'll need at least some of the following tools and techniques:

Maintenance Ingredients

For the subsequent security maintenance work you do for client laptops, these ingredients will be helpful:

As you learn more about the specific needs of your customers' laptops, you'll probably need to add ingredients to this list. That's fine. The better a job you do of identifying a customer's specific needs during your initial assessment and ongoing maintenance, the more protection you can provide them in the long run.

Initial Assessment, Step-By-Step

Now that we have our components assembled, let's take a look at the five steps involved in performing the initial assessment of your customer's mobile-computing security:

Ongoing Maintenance, Step-By-Step

Once assessment and remediation end, regular maintenance and emergency-response drive your ongoing client relationships. The four most important steps involved are listed below. Remember to repeat these steps as scheduled or needed -- this is no "fix it and forget it" activity!

Here's another thing to consider: Depending on the number of customers you service -- and their levels of ability and sophistication -- you can handle mobile-computer management by creating well-documented, nicely-linked Web pages that tell customers how to take care of themselves. It's the ultimate form of manual update. Alternatively, you can sell clients highly-capable, highly-automated systems built around mobile or systems management products that handle everything automatically without forcing clients to do anything.

Ultimately, you'll discover what's optimal for each customer based on the costs they can bear and your ability to implement more complex offerings. But somewhere between helping customers do it themselves, you can find a mobile-computing security solution that fits both their needs and their pocketbooks.

ED TITTEL is a technology writer who has contributed to more than 100 computer books; a trainer; and a consultant who specializes in IT certification and information security.