Device Integrity Protection - Client device configuration should be hardened to minimize impact/likelihood of successful network attack
While SecureDoc performs an invaluable service ensuring that data is protected by encryption, and that user access to SecureDoc-protected devices is locked down and governed by permitting only specific users to authenticate at Pre-Boot, there are other risks that any security-conscious organization should be aware of and include in its overall security design.
Client device configuration should be hardened to minimize impact/likelihood of successful network attack
Prior to installing the SecureDoc client software and subsequently encrypting any endpoint device, WinMagic recommends as a best practice, the devices, device operating systems and device configurations must be hardened.
Though WinMagic does not recommend the specifics of any other company's security offerings, customers are requested to source and implement credible:
- Anti-Virus software
- Anti-Trojan software
- Anti-Malware software
- Firewall software
and also to:
- Ensure end users do not have the administrative rights required to alter the configuration of their computers
- Ensure end users do not have the administrative rights necessary to install or remove software, particularly security tools mentioned above.
For reference and further study, customers are requested to investigate recommendations and best-practice processes as recommended by such organizations as theCenter for Internet Security (CIS) www.cisecurity.org