Cover image for Mobile Computing : Securing your workforce.
Mobile Computing : Securing your workforce.
Title:
Mobile Computing : Securing your workforce.
Author:
IT, BCS The Chartered Institute for.
ISBN:
9781780171111
Physical Description:
1 online resource (55 pages)
Contents:
Copyright -- CONTENTS -- FOREWORD -- 1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL -- WHAT IS A 'BETTER CONNECTED' WORKFORCE? -- 'PROSUMERISATION' -- WHAT ARE THE BUSINESS DRIVERS? -- LOOKING FORWARD -- ENSURING SAFE END-USER ADOPTION -- CONCLUSION -- 2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH -- PUTTING THE RIGHT TOOLS IN PLACE -- 3 SECURITY ON THE MOVE -- NOTES -- 4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS -- THE LEGAL MINEFIELD -- THE LAYERED SECURITY MODEL -- DETERMINING THE SECURITY RISK -- PERSONAL RESPONSIBILITY -- 5 DELIVERING SECURITY ON EMPLOYEES' PERSONAL LAPTOPS -- BENEFITS OF BRING-YOUR-OWN -- SECURITY DRAWBACKS -- PLUG-IN SECURITY -- VIRTUAL WORKSPACES -- ASSESSING THE BENEFITS -- NOTES -- 6 SAFETY TRAINING FOR THE WORKFORCE -- HOW BIG IS THE ICEBERG? -- IT'S AS IF NO ONE CARES -- THE TIME HAS COME FOR ACTION -- 7 CEOs IN THE DOCK -- SMARTPHONES ARE MINICOMPUTERS -- SENIOR MANAGERS ARE PERSONALLY LIABLE -- TAKING SECURITY MEASURES -- ARE BUSINESS PEOPLE BREAKING THE LAW? -- 8 STOPPING THE MOBILE BOT THREAT -- LACK OF SECURITY -- MALWARE LAUNCH PAD -- BLENDED THREATS -- 9 PASSWORD SECURITY -- ENFORCING STRONGER PASSWORD POLICIES -- PASSWORD SECURITY DOES NOT HAVE TO BE A PAIN -- HIGHER RISK GROUPS -- TYPES OF ATTACKS -- 10 ENCRYPTION IS SOMETIMES NOT ENOUGH -- RISK-RISK TRADE-OFFS -- THE EFFECTS OF ENCRYPTION -- NOTES -- 11 NFC: ANOTHER ONE FOR THE ACRONYM SOUP -- 12 NETWORK SECURITY WHEN GOING MOBILE -- NAC = RIP AND REPLACE -- NAC = ANOTHER BRICK IN THE WALL -- NAC = THE SECURITY ORCHESTRATOR -- 13 IMPROVING YOUR NETWORK AND APPLICATION ASSURANCE STRATEGY -- THE 0DAY MENACE -- TIERED APPROACH -- NOTES -- 14 MOBILE RULES FOR SECURITY OFFICERS: A 'CASE STUDY' -- MOBILE RULES -- USEFUL LINKS -- RESEARCH AND ARTICLES -- ORGANISATIONS -- BLOGS -- OTHER.
Abstract:
According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics include: personal mobile devices at work; passwords; data encryption.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Subject Term:
Electronic Access:
Click to View
Holds: Copies: