CONCLUSIONS

The discussion throughout the preceding chapters has clearly illustrated the power and flexibility offered by mobile devices, and the significance of the data that they can store and access as a result. Their clear benefits mean that such devices are already an inescapable part of many people’s personal and professional lives. Moreover, we can guarantee that their capability will increase as time goes on, and we will consequently be carrying an ever-more important asset that most definitely demands protection.

As with many aspects of security, it is possible to protect our mobile devices and data, but it does not happen by itself. It requires a combination of factors including technical safeguards, corporate policy and personal ...

Get Mobile Security: A Pocket Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.