Sue Marquette Poremba has written many times about how the mobile office increases security risks, particularly via the devices that enable us to work from home or coffee shops or hotel rooms.
ISACA, a leading global association for enterprise governance of IT, also sees the risks involved with mobile devices. The organization recently published a white paper, Securing Mobile Devices. Sue spoke with Mark Lobel, principal, PricewaterhouseCoopers, and ISACA white paper project development team member, about the top five risks for mobile devices and the best ways to secure them. He told her this to start:
The definition of mobile devices is any end point, not just smartphones or laptops or USB. Everybody tends to think of mobile devices as smartphones, but we carry data in multiple ways. And they create different challenges than traditional enterprise computing, where everything is centralized and better protected. It's very hard to drop a mainframe, but it is easy for a device sitting in your back pocket to be destroyed or lost.
This slideshow highlights the top five risks posed by the use of mobile devices and how to establish security measures to protect confidential information.
With increased popularity comes more attention from malicious hackers trying to access PII and other sensitive data. It's more critical than ever before to understand how -- and where -- you're storing your data, and the variety of vulnerabilities that can exist in the apps in your network. ... More >>
While cyber crime continued to dominate headlines and wreak havoc on organizations of all sizes across nearly every industry in the first half of 2014, it's refreshing to note law enforcement also stepped it up. ... More >>
The patches released by Microsoft for the August Patch Tuesday include nine bulletins (two critical and seven important) and cover 38 CVEs. ... More >>