Five Top Mobile Device Risks and How to Protect Your Business

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for five security risks posed by the use of mobile devices and ways to protect your business.

Sue Marquette Poremba has written many times about how the mobile office increases security risks, particularly via the devices that enable us to work from home or coffee shops or hotel rooms.

ISACA, a leading global association for enterprise governance of IT, also sees the risks involved with mobile devices. The organization recently published a white paper, Securing Mobile Devices. Sue spoke with Mark Lobel, principal, PricewaterhouseCoopers, and ISACA white paper project development team member, about the top five risks for mobile devices and the best ways to secure them. He told her this to start:

The definition of mobile devices is any end point, not just smartphones or laptops or USB. Everybody tends to think of mobile devices as smartphones, but we carry data in multiple ways. And they create different challenges than traditional enterprise computing, where everything is centralized and better protected. It's very hard to drop a mainframe, but it is easy for a device sitting in your back pocket to be destroyed or lost.

This slideshow highlights the top five risks posed by the use of mobile devices and how to establish security measures to protect confidential information.

More Slideshows:


Identity Eight Top Google Apps for Productivity Eight of the highest-rated apps for productivity from the Google Apps Marketplace.

12 Hot New Tablets Hitting the Market The market is expanding at a brisk pace with many new competitive tablets being introduced to the public.


10 Good Ways to “Tell Me About Yourself” You know it’s coming, so be prepared with an answer that grabs their attention.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

AppRiverScamPreventionTips0x Five Tips to Avoid Falling Victim to Online Scammers

While vendors are busy planning ways to push sales even higher in 2014, you can be certain that just as many cyber criminals are plotting to profit from this year's "season of goodwill." ...  More >>

HAXLR8RStartups0x Robotics Take Center Stage: Ten New Hardware Startups

Recently, HAXLR8R held its Demo Day in San Francisco, where it revealed its fifth class of new hardware startups, which span the markets from wearables to security to biology. ...  More >>

Security49-190x128 Using Tokenization for Superior Data Security

With the launch of ApplePay for secure online and mobile payments, tokenization has become a hot topic in data security. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date