Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

The 10 most common mobile security problems and how you can fight them

Michael Cooney | Sept. 20, 2012
When it comes to security, most mobile devices are a target waiting to be attacked. That's pretty much the conclusion of a report to Congress on the status of the security of mobile devices this week by watchdogs at the Government Accountability Office.

" Provide mobile device security training: Training employees in an organization's mobile security policies can help to ensure that mobile devices are configured, operated, and used in a secure and appropriate manner.

" Establish a deployment plan: Following a well-designed deployment plan helps to ensure that security objectives are met.

" Perform risk assessments: Risk analysis identifies vulnerabilities and threats, enumerates potential attacks, assesses their likelihood of success, and estimates the potential damage from successful attacks on mobile devices.

" Perform configuration control and management: Configuration management ensures that mobile devices are protected against the introduction of improper modifications before, during, and after deployment.



Previous Page  1  2  3  4  5 

Sign up for Computerworld eNewsletters.