Chapter 2

Why Do I Care? The Mobile Device Threat

In This Chapter

arrow Recognizing the seriousness of mobile device security

arrow Understanding the risks of having a compromised mobile device

arrow Assessing the available tools

arrow Planning to keep your devices secure

In the present day, employees are king, bringing with them (into the network) not one, not two, but sometimes three or more personal devices that have little or no corporate-approved applications; and yet they connect to the corporate network and chat, e-mail, talk, network socially, and connect to the cloud. It’s a bad horror movie, The Invasion of the Devices, and you’re the hero who’s being overrun.

These devices are highly customizable (unlike enterprise-issued laptops, which typically have a lot of restrictions tied to them in terms of what applications the employee can install). Therefore, the employee has a personal attachment to these devices and swears by them both at work and outside of work. And this phenomenon, which could be brushed off as an anomaly just a few years ago, is fast becoming the norm in enterprises, so you ...

Get Mobile Device Security For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.