Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy

Why Should I Care? Mobile Security for The Rest of Us

10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats

by Veracode

Why Should I Care? Mobile Security for The Rest of Us

Subscribe to new books via dBooks.org telegram channel

Join
DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

I've already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that's here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only - meaning 77 percent of employees are using their own devices in some capacity to do their job. 1 As the Chief Information Security Officer (CISO) at Veracode I have experienced this trend firsthand and if it hasn't hit you yet, the BYOD tidal wave is coming your way!

This book lists 10 simple things that every business user can do to help protect their personal information as well as their company's data, IP and brand when they use their mobile devices at work. We've made every effort to make our mobile security story a fun one to read. Some of the details around the mobile security stack can be tedious, but it's hard to resist when the stack looks like a club sandwich!

This open book is licensed under a Creative Commons License (CC BY). You can download Why Should I Care? Mobile Security for The Rest of Us ebook for free in PDF format (1.5 MB).

Table of Contents

Part I
It's Scary Out There
Part II
Whose Job Is It Anyway?
Part III
10 Ways to Secure Your Mobile Gadget

Book Details

Title
Why Should I Care? Mobile Security for The Rest of Us
Subject
Computer Science
Publisher
Self-publishing
Published
2012
Pages
46
Edition
1
Language
English
PDF Size
1.5 MB
License
CC BY

Related Books

The Condition of Digitality
David Harvey's The Condition of Postmodernity rationalised capitalism's transformation during an extraordinary year: 1989. It gave theoretical expression to a material and cultural reality that was just then getting properly started - globalisation and postmodernity - whilst highlighting the geo-spatial limits to accumulation imposed by o...
Fulfilling the Promise of Technology Transfer
Universities and research institutes are increasingly expected to contribute to society by creating innovation from the returns of their research results and the establishment of new technologies. Toward that goal, Keio University in Japan held an international symposium titled "Fulfilling the Promise of Technology Transfer: Fostering Innovati...
The Basics of User Experience Design
If you're looking to gain an introduction into the world of user experience (UX) design - or maybe even freshen up your knowledge of the field - then this UX design book is the ideal place to start. You'll cover a wide range of topics over nine highly readable chapters, with each one acting as a mini crash course. By the end, you'...
Circular Migration and the Rights of Migrant Workers in Central and Eastern Europe
This open book adopts a rights-based approach to shed light on the different legal and policy instruments that have been developed to implement circular migration policies in the EU, and their consequences for the rights of migrant workers. It contributes to the understanding of the meaning of this concept in general and in the EU, as well as speci...
Intelligent Human Computer Interaction
This book constitutes the thoroughly refereed proceedings of the 9th International Conference on Intelligent Human Computer Interaction, IHCI 2017, held in Evry, France, in December 2017. The 15 papers presented together with three invited papers were carefully reviewed and selected from 25 submissions. The conference is forum for the presentation...
Rethinking the Internet of Things
Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of inter...