News

Mobile security policy should be consistent across all mobile devices, including USB storage, PDAs, smart phones, laptops, and kiosks. Using information classification, organizations can build a ...
Regardless of what mobile devices your employees use, without a policy, security disappears. Here are five questions to ask to cover your bases in a mobile security policy While 69 percent of ...
Mobile security has long been an afterthought in enterprise environments. While we’ve invested heavily in protecting workstations, networks and cloud infrastructure, mobile devices—despite functioning ...
The device ownership model doesn’t determine the level of security of a company’s mobile policy. Instead, it relies on the efficiency of the controls placed by your IT team. 1. Set up mobile ...
Best practices are not usually related to any particular University information security policy, but are instead a combination ... you can use to protect your resources and data. Mobile computing ...
The explosion of smart mobile devices brings with it unparalleled enterprise risk. It is hard enough to secure corporate resources when they are in IT’s glass house, or at least on the company ...
The Trojan, which Lookout Mobile Security called the most sophisticated ... to support and having clear, enforceable policies for those devices is key. That means understanding what your company ...
To truly defend devices, organizations must incorporate Mobile Threat Defense solutions into their security stacks. Mobile Threat Defense offers a holistic overview of the global threat landscape ...
mobile threat defense software and mobile device management tech designed to enforce security policies — weren’t sufficient. Although some details are redacted from the report, such as how ...