How secure is your organization's BES and associated BlackBerry devices? Use this checklist to help identify security holes. Research In Motion’s (RIM) BlackBerry Enterprise Server (BES) software is known through the IT industry for its proven security safeguards. But any BES is really only as secure as the responsible administrator(s) makes it, right? In the most recent edition of the BlackBerry Connection newsletter, RIM distributed an interesting set of check-lists meant to help BES admins accurately gauge their organizations’ BlackBerry security. The exercises are a bit basic—especially if you’re managing a BES with lots of custom settings. But it’s a great starting point for admins looking to ensure their BES infrastructure is as secure as possible. RIM included two checklists in the newsletter—one on securing BlackBerry handhelds and data contained within and another on secure communications to and from BlackBerrys. But I’m only listing the first here. Pop-on over to RIM’s website for the second checklist. From RIM: “Are you sure your organization’s data is protected? With all the security features built into the BlackBerry Enterprise Server and the new BlackBerry Enterprise Server Express you would think the answer to be, ‘plenty sure.’ But just as an unlocked house keeps only honest men out, all the security features in the world cannot help you if you do not turn the locks.” Checklist: Secure the Mobile Device and Its DataLabel mobile devices with a serial number and a toll-free telephone number. Also add the device owner’s name and phone number to the BlackBerry smartphone’s Owner feature. Hint: Find the Owner feature by going to Options/Owner. Require users to authenticate using security passwords. Define authentication features such as password expiry, maximum number of attempts, password length, and complexity. Hint: Click here for example password IT policies. Ensure that all devices have timeout mechanisms that automatically prompt for a password after a period of inactivity. Hint: Review how your users will be interacting with their devices to balance between security and usability. Protect mobile devices from malicious third-party applications. Hint: Read “Protecting the BlackBerry Smartphones Platform Against Malware.” Regularly back up all data on the device. Hint: Backup is automatic with the BlackBerry Enterprise Solution. Keep mobile device software and settings up to date (OS patches, server patches, and apply the latest IT policy settings). Hint: BlackBerry Enterprise Server v5 and BlackBerry Enterprise Server Express can make device updates over the air. Specify whether or not applications, including third-party applications, on the mobile device can initiate specific types of connections. Hint: Review your policies for connections to BluetoothŽ devices, the USB port, the corporate network, and so on. Enforce security and policy controls through an IT-managed server. For more on BlackBerry user security, read my recent post, “BlackBerry Security Basics: Five Tips to Keep Your Smartphone Safe.” And if you’re not already subscribed to RIM’s BlackBerry Connections newsletter, you can sign up on the company’s website. AS Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe