TITLE

Mobile Security

AUTHOR(S)
Dysart, Joe
PUB. DATE
May 2012
SOURCE
Electrical Wholesaling;May2012, p28
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on how companies secure their variable information against cyber intruders in the U.S. It reveals that smartphones owned by employees may provide unauthorized passage into the company's information technology (IT) system for computer hackers if they are not properly secured. The Bring Your Own Device (BYOD) policy is discussed.
ACCESSION #
76143562

 

Related Articles

  • Wireless in enterprise often open door to hackers. Dano, Mike // RCR Wireless News;3/7/2005, Vol. 24 Issue 10, p12 

    Focuses on the vulnerability of wireless and mobile communications systems to hackers and corporate infiltrators. Impact of hacking; Security concerns of corporations over the use of mobile phones; Examples of software companies that offer and provide mobile security systems and services.

  • SAFE SOLUTIONS FOR ALLOWING EMPLOYEES TO USE THEIR MOBILE DEVICES AT WORK.  // Electrical Wholesaling;May2012, p29 

    The article provides safe solutions when it comes to allowing employees to use their mobile phones at work in relation to computer security in the U.S. It recommends to only permit emails that reside on the network and to force password strength on all mobile devices. It also recommends to...

  • Access all areas. Mayne, Mark // SC Magazine: For IT Security Professionals (UK Edition);Apr2009, p26 

    This article explores the growing concerns over endpoint security. It attributes the situation to security problems raised by BlackBerrys, iPhones and other smartphones. It challenges the traditional definition of endpoint security in two ways: by increased productivity through mobile working,...

  • Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals. Igor, Zhukov; Dmitry, Mikhaylov; Andrey, Starikovskiy; Dmitry, Kuznetsov; Anastasia, Tolstaya; Alexander, Zuykov // International Journal of Computer Network & Information Security;Apr2013, Vol. 5 Issue 5, p1 

    This paper deals with the description of the threats to mobile devices and suggests the security software that provides comprehensive protection of personal data and mobile telephone from malware and illegal activity of cyber criminals. The developed security software Green Head protects...

  • Lessons from the Cyber Trenches. Sharick, Paula // Windows IT Pro;Oct2004, Vol. 10 Issue 12, p41 

    Focuses on the steps taken by an information technology (IT) professional in fighting against network intruders. Adjustments made by the IT professional in determining the purpose of server exploitation; Use of Microsoft Baseline Security Analyzer in securing the web server; Configuration of the...

  • Employees bringing their smartphones to work? 6 ways to manage the risks.  // HR Specialist;Jul2012, Vol. 10 Issue 7, p5 

    The article offers six steps before allowing employees to bring their smartphones for work. It states that employers should require employees to install information technology (IT) protections. It indicates that employer should prepare in advance for a potential security threat. It suggests that...

  • Take mobile defense seriously. Cattell, Jonathan // SC Magazine: For IT Security Professionals (15476693);Mar2011, Vol. 22 Issue 3, p18 

    The author stresses the importance for mobile operators to be aware of the magnitude of mobile threats. He mentions the results of a study which indicate lack of pressure from subscribers in key security concerns as a factor behind the lag among mobile operators in terms of the implementation of...

  • Ajax Applications in Web 2.0 Vulnerable.  // IT Professional;Jul/Aug2007, Vol. 9 Issue 4, p8 

    The article cites key findings from research by computer security specialists in the U.S. indicating the vulnerability of Ajax applications, which are popular in Web 2.0, to JavaScript hijacking in 2007. The security researchers found nearly all the major toolkits in Ajax to be vulnerable to the...

  • Security is 'kid' stuff. Rapoza, Jim // eWeek;7/9/2007, Vol. 24 Issue 24, p46 

    The article focuses on the significance for information technology (IT) and security staffers to think as computer hackers. The author explained that most of staffers do not have the time or skill sets to attain the expertise possessed by high-level hackers and security researchers. He pointed...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics