Mobile computing securing your workforce

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics include: personal mo...

Full description

Bibliographic Details
Corporate Author: IT, BCS The Chartered Institute for
Format: eBook
Language:English
Published: Swindon British Informatics Society 2011
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Copyright; CONTENTS; FOREWORD; 1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL; WHAT IS A 'BETTER CONNECTED' WORKFORCE?; 'PROSUMERISATION'; WHAT ARE THE BUSINESS DRIVERS?; LOOKING FORWARD; ENSURING SAFE END-USER ADOPTION; CONCLUSION; 2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH; PUTTING THE RIGHT TOOLS IN PLACE; 3 SECURITY ON THE MOVE; NOTES; 4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS; THE LEGAL MINEFIELD; THE LAYERED SECURITY MODEL; DETERMINING THE SECURITY RISK; PERSONAL RESPONSIBILITY; 5 DELIVERING SECURITY ON EMPLOYEES' PERSONAL LAPTOPS.
  • Types of attacks10 encryption is sometimes not enough.; risk-risk trade-offs; the effects of encryption; notes; 11 nfc: another one for the acronym soup; 12 network security when going mobile; nac=rip and replace; nac=another brick in the wall; nac=the security orchestrator; 13 improving your network and application assurance strategy; the oday menace; tiered approach; notes; 14 mobile rules for security officers: a 'case study'; mobile rules; useful links; reasearch and articles; organisations; blogs; other
  • Benefits of bring-your-ownsecurity drawbacks; plug-in-security; virtual workspaces; assessing the benefits; notes; 6 safety training for the workforce; how big is the iceberg?; it's as if no one cares; the time has come for action; 7 ceos in the dock; smartphones are minicomputers; senior managers are personally liable; taking security measures; are business people breaking the law; 8 stopping the mobile bot threat; lack of security; malware lunch pad; blended threats; 9 password security; enforcing stronger password policies; password security does not have to be a pain; higher risk groups
  • Includes bibliographical references