Mobile device security policy begins with mobile platform comparison TAGS: mobile devices Mobility is ubiquitous. You would be hard-pressed to find an organization that does not rely upon mobile devices or smartphones …Continue reading →
April 27, 2024
Mobile device security policy begins with mobile platform comparison TAGS: mobile devices Mobility is ubiquitous. You would be hard-pressed to find an organization that does not rely upon mobile devices or smartphones …Continue reading →
Laptop full disk encryption: debunking the myths TAGS: encryption | mobile devices | security policy Full disk encryption (FDE) is widely used to control the risk of users travelling with (and losing) portable computers containing …Continue reading →
Three portable data storage encryption methods TAGS: encryption | mobile devices Over the past few months, we’ve been exploring different ways to apply encryption to secure confidential business data in a …Continue reading →
Data encryption methods: securing emerging endpoints TAGS: encryption | mobile devices These policies made it easy to feel secure about having your sensitive data left in vehicles, travelling through airports and …Continue reading →
Microsoft NAP/TNC alliance brings new dimension to network access control decisions TAGS: mobile devices | NAC | network security Network access control (NAC) systems provide information security teams with a valuable weapon in the endpoint security war. This is …Continue reading →
Maintaining data security when the employee base goes remote TAGS: mobile devices My main concern after reading your question concerns data storage: where will your important company data reside? Chances are that …Continue reading →
Employee-owned handhelds: Security and network policy considerations TAGS: mobile devices BlackBerrys, iPhones, Treos, iPods and other network-enabled handheld gadgets are now an essential part of our lives. Almost everyone carries …Continue reading →
Mobile device security in six simple steps TAGS: encryption | mobile devices | network security Two thousand six was the year of laptop theft. In February, a laptop was stolen from an Ernst & Young …Continue reading →