Mobile computing securing your workforce

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics include: personal mo...

Full description

Bibliographic Details
Corporate Author: IT, BCS The Chartered Institute for
Format: eBook
Language:English
Published: Swindon British Informatics Society 2011
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03527nmm a2200457 u 4500
001 EB001935572
003 EBX01000000000000001098474
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1780171129 
020 |a 9781780171135 
020 |a 9781780171128 
050 4 |a QA76.59 .M458 2011 
245 0 0 |a Mobile computing  |b securing your workforce 
260 |a Swindon  |b British Informatics Society  |c 2011 
300 |a 54 pages 
505 0 |a Copyright; CONTENTS; FOREWORD; 1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL; WHAT IS A 'BETTER CONNECTED' WORKFORCE?; 'PROSUMERISATION'; WHAT ARE THE BUSINESS DRIVERS?; LOOKING FORWARD; ENSURING SAFE END-USER ADOPTION; CONCLUSION; 2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH; PUTTING THE RIGHT TOOLS IN PLACE; 3 SECURITY ON THE MOVE; NOTES; 4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS; THE LEGAL MINEFIELD; THE LAYERED SECURITY MODEL; DETERMINING THE SECURITY RISK; PERSONAL RESPONSIBILITY; 5 DELIVERING SECURITY ON EMPLOYEES' PERSONAL LAPTOPS. 
505 0 |a Types of attacks10 encryption is sometimes not enough.; risk-risk trade-offs; the effects of encryption; notes; 11 nfc: another one for the acronym soup; 12 network security when going mobile; nac=rip and replace; nac=another brick in the wall; nac=the security orchestrator; 13 improving your network and application assurance strategy; the oday menace; tiered approach; notes; 14 mobile rules for security officers: a 'case study'; mobile rules; useful links; reasearch and articles; organisations; blogs; other 
505 0 |a Benefits of bring-your-ownsecurity drawbacks; plug-in-security; virtual workspaces; assessing the benefits; notes; 6 safety training for the workforce; how big is the iceberg?; it's as if no one cares; the time has come for action; 7 ceos in the dock; smartphones are minicomputers; senior managers are personally liable; taking security measures; are business people breaking the law; 8 stopping the mobile bot threat; lack of security; malware lunch pad; blended threats; 9 password security; enforcing stronger password policies; password security does not have to be a pain; higher risk groups 
505 0 |a Includes bibliographical references 
653 |a COMPUTERS / Data Transmission Systems / General / bisacsh 
653 |a Data encryption (Computer science) / fast 
653 |a Chiffrement (Informatique) 
653 |a Informatique mobile 
653 |a COMPUTERS / Networking / Vendor Specific / bisacsh 
653 |a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524 
653 |a Mobile computing / http://id.loc.gov/authorities/subjects/sh95004596 
653 |a Mobile computing / fast 
710 2 |a IT, BCS The Chartered Institute for 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 1780171129 
776 |z 9781780171128 
776 |z 1780171110 
776 |z 9781780171111 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781780171111/?ar  |x Verlag  |3 Volltext 
082 0 |a 004.6 
082 0 |a 331 
082 0 |a 500 
520 |a According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics include: personal mobile devices at work; passwords; data encryption