Mobile Security for the Rest of Us by Veracode - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

img4.png

Our mobile devices are wonderful things.

Not only are they highly portable, they are essentially small computers themselves – allowing us to stay productive with apps, email and Internet access at all times. We use them on our commute, we take them when we travel, and increasingly, we bring them to the office with us. They store vast amounts of information and provide a critical gateway to the rest of the organization.

Unfortunately, your favorite mobile gadget is inherently insecure. Small and compact, mobile devices are easy to lose or steal. Yet the looming threats to mobile security are larger than petty thieves alone. Hackers and criminals who don’t even need physical access to your device can crack its sensitive and confidential data. Unless proper precautions are taken, intruders can “sniff” personally identifiable information over wireless networks or worse still, install mobile malware – malicious applications that hijack your mobile device to do all sorts of nefarious things.

Your employer or service provider has supplied this booklet to educate you about the potential dangers of mobile computing and to impart 10 simple things you can do to protect yourself and your organization.

To do this, we’ll need some help.