You are previewing Mobile Computing - Securing your workforce.
O'Reilly logo
Mobile Computing - Securing your workforce

Book Description

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics covered include: using personal mobile devices at work; password security; data encryption; raising user awareness; securing networks; legal aspects of data security; and the danger of risk trade-offs.

Table of Contents

  1. COPYRIGHT
  2. ADVERT PAGE
  3. CONTENTS
  4. FOREWORD
  5. 1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL
    1. WHAT IS A ‘BETTER CONNECTED’ WORKFORCE?
    2. ‘PROSUMERISATION’
    3. WHAT ARE THE BUSINESS DRIVERS?
    4. LOOKING FORWARD
    5. ENSURING SAFE END-USER ADOPTION
    6. CONCLUSION
  6. 2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH
    1. PUTTING THE RIGHT TOOLS IN PLACE
  7. 3 SECURITY ON THE MOVE
    1. NOTES
  8. 4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS
    1. THE LEGAL MINEFIELD
    2. THE LAYERED SECURITY MODEL
    3. DETERMINING THE SECURITY RISK
    4. PERSONAL RESPONSIBILITY
  9. 5 DELIVERING SECURITY ON EMPLOYEES’ PERSONAL LAPTOPS
    1. BENEFITS OF BRING-YOUR-OWN
    2. SECURITY DRAWBACKS
    3. PLUG-IN SECURITY
    4. VIRTUAL WORKSPACES
    5. ASSESSING THE BENEFITS
    6. NOTES
  10. 6 SAFETY TRAINING FOR THE WORKFORCE
    1. HOW BIG IS THE ICEBERG?
    2. IT’S AS IF NO ONE CARES
    3. THE TIME HAS COME FOR ACTION
  11. 7 CEOs IN THE DOCK
    1. SMARTPHONES ARE MINICOMPUTERS
    2. SENIOR MANAGERS ARE PERSONALLY LIABLE
    3. TAKING SECURITY MEASURES
    4. ARE BUSINESS PEOPLE BREAKING THE LAW?
  12. 8 STOPPING THE MOBILE BOT THREAT
    1. LACK OF SECURITY
    2. MALWARE LAUNCH PAD
    3. BLENDED THREATS
  13. 9 PASSWORD SECURITY
    1. ENFORCING STRONGER PASSWORD POLICIES
    2. PASSWORD SECURITY DOES NOT HAVE TO BE A PAIN
    3. HIGHER RISK GROUPS
    4. TYPES OF ATTACKS
  14. 10 ENCRYPTION IS SOMETIMES NOT ENOUGH
    1. RISK-RISK TRADE-OFFS
    2. THE EFFECTS OF ENCRYPTION
    3. NOTES
  15. 11 NFC: ANOTHER ONE FOR THE ACRONYM SOUP
  16. 12 NETWORK SECURITY WHEN GOING MOBILE
    1. NAC = RIP AND REPLACE
    2. NAC = ANOTHER BRICK IN THE WALL
    3. NAC = THE SECURITY ORCHESTRATOR
  17. 13 IMPROVING YOUR NETWORK AND APPLICATION ASSURANCE STRATEGY
    1. THE 0DAY MENACE
    2. TIERED APPROACH
    3. NOTES
  18. 14 MOBILE RULES FOR SECURITY OFFICERS: A ‘CASE STUDY’
    1. MOBILE RULES
  19. USEFUL LINKS
    1. RESEARCH AND ARTICLES
    2. ORGANISATIONS
    3. BLOGS
    4. OTHER