Mobile Security: A Pocket Guide

Mobile Security: A Pocket Guide

Proliferation of mobile devices means proliferation of information risk!

This pocket guide provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems. Available for ORDER now.

Ready to order
Sub Total: R 0,00 (ZAR)

Other payment options available


A concise, practical briefing on the key issues surrounding mobile security

This pocket guide gives you clear and reliable guidance on how to protect the information contained in your mobile phone. Written by one of the country’s top academic experts on information security, the guide covers such topics as safeguarding data through encryption, establishing a virtual private network (VPN) to create a secure way for your staff to connect to the server on a remote device, and countering the growing threat on mobile platforms of SMS-phishing and malware. Rather than trying to ban the Blackberry, the solution proposed is for organisations to factor mobile devices into their overall information security policy.

The recommendations contained in this pocket guide are designed to enable your organisation to enjoy the benefits of mobile phones and personal digital assistants (PDAs) without sacrificing the ability to operate as safely and securely as possible.

The key themes tackled in this pocket guide are:

  • the importance of mobile technologies
  • physical threats in the outside world
  • dealing with network connectivity
  • authenticating the user
  • mechanisms for protecting mobile data
  • attacks facing mobile devices and users
  • the potential limitations of mobile security features.

The benefits of reading this guide …

  • Safeguard sensitive information
    A simple way to protect the information on a mobile in the event of loss or theft is to use password protection. Without it, anyone who gets hold of the device has a free hand to browse its contents. Choosing and using a strong password is just as important on your mobile as it is for your desktop
  • Use encryption
    With a mobile, data is often held on secure digital (SD) cards rather than in the device’s onboard memory. By encrypting the data, you can prevent thieves from accessing the contents of your SD cards
  • Give your employees some boundaries
    Personal devices hold a lot of corporate data that simply should not be there in the first place. By setting up proper technical controls, you can regulate what material your staff are permitted to take out of the office on their mobile phones
  • Prevent a virus infection
    Attackers are taking an increasing interest in mobile platforms, so providing some level of anti-virus protection for handheld devices is increasingly recommended. With the anti-virus software on your desktop, you can connect up your mobile and give it a virus scan.

Forewarned is forearmed, and with the expert guidance contained in this pocket guide you can retain the advantages associated with this new technology while ensuring that your confidential information will stay confidential.

What other people say about this pocket guide:

“All in all, this is an excellent little primer into the issues surrounding mobile security, containing much of what we probably know already, reminding us to be vigilant and throwing light on emerging issues of which we were probably not aware!”

George Williams, MBCS, CITP, MIMC.

Find out how to protect your corporate information – buy this essential guide to mobile security today!

About the author:

Professor Steven Furnell is the head of the Centre for Information Security & Network Research at the University of Plymouth. He has been active in security-related research since 1992, and his interests include computer crime, user authentication and security usability. He is the Editor-in-Chief of the journal Information Management & Computer Security, a Fellow and Branch Chair of the British Computer Society (BCS), and a Senior Member of the Institute of Electrical and Electronic Engineers (IEEE).

Authors: Steven Furnell
Publisher: IT Governance Publishing Ltd
ISBN: 9781849280204
Pages: 82
Format: Softcover
Published Date: 16 July 2009
Availability: In Stock

Product Rating: (0.00)   # of Ratings: 0   (Only registered customers can rate)

There are no comments for this product.