TITLE

A day in the life of mobile data

AUTHOR(S)
Allen, Martin
PUB. DATE
December 2005
SOURCE
Management Services;Winter2005, Vol. 49 Issue 4, p14
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article discusses the importance of mobile devices to corporations. It relates a story wherein an employee's negligence of securing company data can result to planned or opportunistic theft. Mobile devices are a significant, increasing, and productive part of the information infrastructure of modern enterprises. However, greater efficiency in the field carries an increased risk of compromising sensitive and confidential information through carelessness or opportunistic theft. Even the best employees cannot efficiently protect the company's data, so the organization must provide an adequate security system which automatically protects information in accordance with central policies.
ACCESSION #
19632057

 

Related Articles

  • An Unsecured Mobile Device Could Spy On Us, Steal Money from Us. Kadam, Avinash W. // PC Quest;Aug2013, p38 

    The article focuses on the adverse impact of an unsecured mobile device on businesses. It reveals that unsecured mobile device can be used as a rogue device that can spy individuals as well as steal money and information from firms. It highlights several levels when securing mobile devices...

  • Related Work in Access-Control Policies.  // IEEE Internet Computing;Mar/Apr2008, Vol. 12 Issue 2, p40 

    The article discusses the suitability of Role-Based Access Control (RBAC) standard to act as the baseline for location-based access control in mobile computing applications. RBAC is considered suitable for access control in computing applications because it meets the requirement of allowing...

  • Security Systems Watch Your Business When No One Else Can. Wenzel, Elsa // PCWorld;May2011, Vol. 29 Issue 5, p32 

    The article discusses the use of digital security systems to monitor and protect businesses. It is noted that surveillance cameras may deter crime and allow business owners to act in case a crime is committed. Some surveillance systems allow to view a scene from smartphones, tablet computers or...

  • Keep watch beyond the perimeter. Condon, Ron // Computer Weekly;12/12/2006, p42 

    The article focuses on the challenge of network security imposed by wireless networks and mobile workers. With security threats growing continuously with each passing day, new technologies and techniques are required to resist them. The problem of network security is common, with companies often...

  • Security: Are we on overload? Gittlen, Sandra // Network World;5/10/2004, Vol. 21 Issue 19, p53 

    This article discusses the importance of changing an organization's security strategy and making sure that the technology that it possesses is not a liability. Taking an inventory of every computer security tool - even those at remote sites, branch offices and on mobile devices - will help in...

  • Security: What will be hot in 2008? Antonopoulos, Andreas // Network World;1/7/2008, Vol. 25 Issue 1, p30 

    The author predicts the development in security for 2008. He said that there will be more security threats on mobile devices due to the increasing enterprise adoption of mobile platforms. Furthermore, he said that hard-drive encryption on the desktop will go on and will be distributed to the...

  • WIRELESS SCRAMBLES TO BATTEN DOWN THE HATCHES. Mehta, Stephanie N. // Fortune;10/18/2004, Vol. 150 Issue 8, p275 

    The article discusses how the proliferation of corporate Wi-Fi systems, illicit and approved, has created a new wave of security challenges for Internet technology departments. The very thing that makes Wi-Fi so attractive to companies--its ability to transmit large streams of data to every...

  • Mobile security: an update. Munro, Ken // SC Magazine: For IT Security Professionals (UK Edition);Jul/Aug2012, p17 

    In this article, the author claims that new attack vectors and vulnerabilities are matching the progress in mobile device management (MDM) offerings. The author reveals that his concerns about simple man-in-middle attacks over Wifi have been partly resolved and lauds as well MDM products for its...

  • Get with the Curve: Time to Secure Mobile Devices. Blitz, Thomas // Bank Technology News;May2006, Vol. 19 Issue 5, p48 

    The article suggests the proper ways of protecting stored data on mobile devices such as notebook and personal computers. The types of risks which dictate the need for financial organizations to protect their data are presented, such as the obvious risk of financial loss through fraud or...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics