A day in the life of mobile data

Allen, Martin
December 2005
Management Services;Winter2005, Vol. 49 Issue 4, p14
Academic Journal
The article discusses the importance of mobile devices to corporations. It relates a story wherein an employee's negligence of securing company data can result to planned or opportunistic theft. Mobile devices are a significant, increasing, and productive part of the information infrastructure of modern enterprises. However, greater efficiency in the field carries an increased risk of compromising sensitive and confidential information through carelessness or opportunistic theft. Even the best employees cannot efficiently protect the company's data, so the organization must provide an adequate security system which automatically protects information in accordance with central policies.


Related Articles

  • An Unsecured Mobile Device Could Spy On Us, Steal Money from Us. Kadam, Avinash W. // PC Quest;Aug2013, p38 

    The article focuses on the adverse impact of an unsecured mobile device on businesses. It reveals that unsecured mobile device can be used as a rogue device that can spy individuals as well as steal money and information from firms. It highlights several levels when securing mobile devices...

  • Related Work in Access-Control Policies.  // IEEE Internet Computing;Mar/Apr2008, Vol. 12 Issue 2, p40 

    The article discusses the suitability of Role-Based Access Control (RBAC) standard to act as the baseline for location-based access control in mobile computing applications. RBAC is considered suitable for access control in computing applications because it meets the requirement of allowing...

  • Security Systems Watch Your Business When No One Else Can. Wenzel, Elsa // PCWorld;May2011, Vol. 29 Issue 5, p32 

    The article discusses the use of digital security systems to monitor and protect businesses. It is noted that surveillance cameras may deter crime and allow business owners to act in case a crime is committed. Some surveillance systems allow to view a scene from smartphones, tablet computers or...

  • Keep watch beyond the perimeter. Condon, Ron // Computer Weekly;12/12/2006, p42 

    The article focuses on the challenge of network security imposed by wireless networks and mobile workers. With security threats growing continuously with each passing day, new technologies and techniques are required to resist them. The problem of network security is common, with companies often...

  • Security: Are we on overload? Gittlen, Sandra // Network World;5/10/2004, Vol. 21 Issue 19, p53 

    This article discusses the importance of changing an organization's security strategy and making sure that the technology that it possesses is not a liability. Taking an inventory of every computer security tool - even those at remote sites, branch offices and on mobile devices - will help in...

  • Security: What will be hot in 2008? Antonopoulos, Andreas // Network World;1/7/2008, Vol. 25 Issue 1, p30 

    The author predicts the development in security for 2008. He said that there will be more security threats on mobile devices due to the increasing enterprise adoption of mobile platforms. Furthermore, he said that hard-drive encryption on the desktop will go on and will be distributed to the...

  • WIRELESS SCRAMBLES TO BATTEN DOWN THE HATCHES. Mehta, Stephanie N. // Fortune;10/18/2004, Vol. 150 Issue 8, p275 

    The article discusses how the proliferation of corporate Wi-Fi systems, illicit and approved, has created a new wave of security challenges for Internet technology departments. The very thing that makes Wi-Fi so attractive to companies--its ability to transmit large streams of data to every...

  • Don't Be Out'smart'ed. Panettieri, Joseph C. // T H E Journal;Feb2006, Vol. 33 Issue 7, p18 

    The article discusses the threats posed by smart mobile phones to data security. More than 100 viruses now target smart phones running mobile operating systems from several high technology companies including Microsoft Corp. Consider the Cabir worm, which targets mobile phones running Symbian OS...

  • Protect mobile device data.  // Communications News;Oct2003, Vol. 40 Issue 10, p6 

    Stresses the importance of protecting mobile device data. Incidence in which a company gains a vested interest in protecting mobile device data; Steps to take when a device is lost or stolen; Benefits from device-management solutions.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics