Mobile Security and Responsibility

When companies extend their IT operations to mobile employees, valuable data and devices are taken out of the protected perimeter of the office, and placed in the briefcases of users. Business processes may run more efficiently, and there may be more flexibility in working practices, but this is of little benefit if attitudes to IT use are complacent or irresponsible.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

ExecBlueprints: Balancing Security and Convenience: Key Strategies for Creating a Safe and Efficient Infrastructure

As technology choices have multiplied and IT’s importance to organizations has grown, more IT leaders are involved in understanding the needs of the business and participating in discussions concerning risk and reward. This white paper offers an overview of current issues that IT faces as it navigates this tricky terrain.
  • Written By:
  • Published On:

ExecBlueprints: Device-Reliant vs. Data-Reliant: How Mobile and Cloud Technologies Influence Workflow

Cloud computing offers an extremely cost-effective alternative to traditional hardware-based infrastructures, but the advantages in flexibility and price must be weighed against issues of security, reliability, and capability. Business unit leaders must partner with IT to determine their needs, understand the impact of new technologies, and chart a path forward together to facilitate stability and efficiency across the entire organization.  
  • Written By:
  • Published On:

Best Practices in Mobile Workforce Management

How can you address the full lifecycle of mobile workforce management and continuously achieve your operational goals? Keep in mind these best practices in planning, executing, and monitoring.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Mobile Access Security & Management

The task of maintaining network and data security is one of an IT administrator's greatest challenges. In recent years, this already difficult task has been further complicated by the proliferation of mobile devices connecting to the network. This white paper discusses some of the challenges involved in delivering secure mobile access to organizational IT resources while also allowing for the use of mobile devices.
  • Written By:
  • Published On:

Top 5 Mobile Security Threats

While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of malicious code. What’s worse is that 50 percent of employees currently use their mobile devices at work. Early recognition of mobile security threats is a company’s best line of defense. Here are today’s top 5 mobile security threats and how to stop them in their tracks.
  • Written By:
  • Published On:

Enterprise Mobile Security: Protecting Mobile Data and Increasing Productivity

Today’s mobile devices improve productivity and efficiency, but they also bring new risks to companies: confidential corporate and personal data can be lost or subject to other threats. Mobile device security management should consider a combination of people, processes, and technology. Learn about current security issues and actionable mobile security best practices so you can mitigate the risks your company is facing.
  • Written By:
  • Published On: