Policies for reducing mobile risk

As the use of employee-owned mobile computing devices increases, so do the risks they pose to corporate networks and data. In this tip, Lisa Phifer outlines the essential components of an information security policy that deals with mobile devices -- both employee and company owned -- and their associated business risks.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly

Close