Thursday, January 6, 2011

"The key to success in life is using the good thoughts of wise people." ~Leo Tolstoy http://bit.ly/fqiVax
Follow your passions. They know the way. ~ Bob Doyle http://bit.ly/gWhrIP
"There are generations yet unborn whose very lives will be shifted and shaped by the moves you make and the actions you take today." ~Andy Andrews http://bit.ly/eO4Xas
"Every single thing you do matters." ~Andy Andrews http://bit.ly/eFw9ej
"Do not anticipate trouble, or worry about what may never happen. Keep in the sunlight." ~Benjamin Franklin #quote http://bit.ly/dK3e0B
Good things, when short, are twice as good. ~Baltasar Gracian, The Art of Worldly Wisdom http://bit.ly/eQW7J2
It is with words as with sunbeams. The more they are condensed, the deeper they burn. ~Robert Southey http://bit.ly/f90nk2

Five Top Mobile Device Risks and How to Protect Your Business | ITBusinessEdge.com

Sue Marquette Poremba has written many times about how the mobile office increases security risks, particularly via the devices that enable us to work from home or coffee shops or hotel rooms.



ISACA, a leading global association for enterprise governance of IT, also sees the risks involved with mobile devices. The organization recently published a white paper, Securing Mobile Devices. Sue spoke with Mark Lobel, principal, PricewaterhouseCoopers, and ISACA white paper project development team member, about the top five risks for mobile devices and the best ways to secure them. He told her this to start:



The definition of mobile devices is any end point, not just smartphones or laptops or USB. Everybody tends to think of mobile devices as smartphones, but we carry data in multiple ways. And they create different challenges than traditional enterprise computing, where everything is centralized and better protected. It's very hard to drop a mainframe, but it is easy for a device sitting in your back pocket to be destroyed or lost.



This slideshow highlights the top five risks posed by the use of mobile devices and how to establish security measures to protect confidential information.



Click through for five security risks posed by the use of mobile devices and ways to protect your business.



Sources:

http://www.itbusinessedge.com/cm/blogs/weinschenk/the-hard-job-of-managing-mobility/?cs=41193

http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Securing-Mobile-Devices.aspx

http://www.networksecurityedge.com/content/five-top-risks-mobile-devices-and-how-protect-them