Securing Mobile Devices 

 

Securing Mobile Devices   Download (Registration Required, 282K)

  Provide feedback on this document
Knowledge Center  Visit the Mobile Computing Knowledge Center community

  View News Release

“As information security officer, I found the Securing Mobile Devices white paper in particular very useful in highlighting the major vulnerabilities and the business risks associated with mobile device use…a lot of people think purely in terms of technical problems and solutions, so this sort of paper is very helpful in drawing their attention back to business imperatives."
—Rob Dixon, CISA, UK

Mobile computing devices have become a critical tool in today’s networked world. Enterprises and individuals alike rely on mobile devices to remain reachable when away from the office or home. While mobile devices, such as smartphones, laptops, personal digital assistants (PDAs) and Universal Serial Bus (USB) memory sticks have increased convenience, as well as productivity in the workplace, these benefits are not without risks.

Mobile devices have been, and continue to be, a source of security incidents. These stem from issues such as device loss, malware and external breaches. As the availability of human resources and systems continues to be critical to society and business operations, it stands to reason that mobile device usage will continue to escalate, as will the features these devices offer. It is therefore imperative that proper risk management be applied, and security controls implemented, to maximize the benefits while minimizing the risks associated with such devices.

Additional resources related to Mobile Devices: