O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Mobile Computing - Securing your workforce

Book Description

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics covered include: using personal mobile devices at work; password security; data encryption; raising user awareness; securing networks; legal aspects of data security; and the danger of risk trade-offs.

Table of Contents

  1. COPYRIGHT
  2. ADVERT PAGE
  3. CONTENTS
  4. FOREWORD
  5. 1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL
    1. WHAT IS A ‘BETTER CONNECTED’ WORKFORCE?
    2. ‘PROSUMERISATION’
    3. WHAT ARE THE BUSINESS DRIVERS?
    4. LOOKING FORWARD
    5. ENSURING SAFE END-USER ADOPTION
    6. CONCLUSION
  6. 2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH
    1. PUTTING THE RIGHT TOOLS IN PLACE
  7. 3 SECURITY ON THE MOVE
    1. NOTES
  8. 4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS
    1. THE LEGAL MINEFIELD
    2. THE LAYERED SECURITY MODEL
    3. DETERMINING THE SECURITY RISK
    4. PERSONAL RESPONSIBILITY
  9. 5 DELIVERING SECURITY ON EMPLOYEES’ PERSONAL LAPTOPS
    1. BENEFITS OF BRING-YOUR-OWN
    2. SECURITY DRAWBACKS
    3. PLUG-IN SECURITY
    4. VIRTUAL WORKSPACES
    5. ASSESSING THE BENEFITS
    6. NOTES
  10. 6 SAFETY TRAINING FOR THE WORKFORCE
    1. HOW BIG IS THE ICEBERG?
    2. IT’S AS IF NO ONE CARES
    3. THE TIME HAS COME FOR ACTION
  11. 7 CEOs IN THE DOCK
    1. SMARTPHONES ARE MINICOMPUTERS
    2. SENIOR MANAGERS ARE PERSONALLY LIABLE
    3. TAKING SECURITY MEASURES
    4. ARE BUSINESS PEOPLE BREAKING THE LAW?
  12. 8 STOPPING THE MOBILE BOT THREAT
    1. LACK OF SECURITY
    2. MALWARE LAUNCH PAD
    3. BLENDED THREATS
  13. 9 PASSWORD SECURITY
    1. ENFORCING STRONGER PASSWORD POLICIES
    2. PASSWORD SECURITY DOES NOT HAVE TO BE A PAIN
    3. HIGHER RISK GROUPS
    4. TYPES OF ATTACKS
  14. 10 ENCRYPTION IS SOMETIMES NOT ENOUGH
    1. RISK-RISK TRADE-OFFS
    2. THE EFFECTS OF ENCRYPTION
    3. NOTES
  15. 11 NFC: ANOTHER ONE FOR THE ACRONYM SOUP
  16. 12 NETWORK SECURITY WHEN GOING MOBILE
    1. NAC = RIP AND REPLACE
    2. NAC = ANOTHER BRICK IN THE WALL
    3. NAC = THE SECURITY ORCHESTRATOR
  17. 13 IMPROVING YOUR NETWORK AND APPLICATION ASSURANCE STRATEGY
    1. THE 0DAY MENACE
    2. TIERED APPROACH
    3. NOTES
  18. 14 MOBILE RULES FOR SECURITY OFFICERS: A ‘CASE STUDY’
    1. MOBILE RULES
  19. USEFUL LINKS
    1. RESEARCH AND ARTICLES
    2. ORGANISATIONS
    3. BLOGS
    4. OTHER