Five Top Mobile Device Risks and How to Protect Your Business

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for five security risks posed by the use of mobile devices and ways to protect your business.

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

Sue Marquette Poremba has written many times about how the mobile office increases security risks, particularly via the devices that enable us to work from home or coffee shops or hotel rooms.

ISACA, a leading global association for enterprise governance of IT, also sees the risks involved with mobile devices. The organization recently published a white paper, Securing Mobile Devices. Sue spoke with Mark Lobel, principal, PricewaterhouseCoopers, and ISACA white paper project development team member, about the top five risks for mobile devices and the best ways to secure them. He told her this to start:

The definition of mobile devices is any end point, not just smartphones or laptops or USB. Everybody tends to think of mobile devices as smartphones, but we carry data in multiple ways. And they create different challenges than traditional enterprise computing, where everything is centralized and better protected. It's very hard to drop a mainframe, but it is easy for a device sitting in your back pocket to be destroyed or lost.

This slideshow highlights the top five risks posed by the use of mobile devices and how to establish security measures to protect confidential information.

 

More Slideshows

Misc24-290x195 Which Web Programming Language Is Most Secure?

Take a deeper look into the security of a number of the most popular programming languages, including .NET, Java, ColdFusion and ASP. ...  More >>

Security28-290x195 Nine Questions to Ask When Selecting a Security Vendor

You need it. They claim to have it. What questions should you be asking as you hunt for the "just right" vendor to help you defend against the most sophisticated and determined adversaries?  ...  More >>

LogRhythmHeartbleed0x Heartbleed: Eight Tips and Strategies for Keeping Safe

One of the most dangerous IT security threats of all time emerged recently -- a bug called Heartbleed. Here are eight tips for keeping your data safe. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.