Essential practices for securing mobile devices

News

Essential practices for securing mobile devices

For workers who conduct their business on the go, mobile devices represent a critical lifeline to enterprise applications and data, but precautions are required to avoid enterprise network breaches and private data disclosures. In this lesson, Lisa Phifer examines inherent weaknesses in mobile messaging devices, and discusses not only how to lock down mobile platforms to protect against emerging threats and risky end-user behaviors, but also how to ensure Bluetooth-enabled handsets aren't vulnerable to attack.

   Webcast: Top 5 ways to lock down your mobile devices
   Technical tip: Taking the bite out of Bluetooth
   Podcast: Platform protection: Security issues for mobile devices
   Quiz: Essential practices for securing mobile devices
   About the instructor


MAIN MENU
Messaging Security School home
Managing traffic: Keeping your content where it belongs
The changing threat of email attacks
Defending mobile devices from viruses, spyware and malware
Essential practices for securing mobile devices
Secure instant messaging
Countermeasures for malicious email code
Securing Microsoft Exchange

Webcast: Top 5 ways to lock down your mobile devices
Length: 50 minutes
For workers who conduct their business on the go, mobile devices represent a critical lifeline to enterprise applications and data. Mobile messaging can increase workforce agility and productivity, but precautions are required to avoid enterprise network breaches and private data disclosure. In this webcast, Phifer details five essential best practices for securing mobile devices.

Technical tip: Taking the bite out of Bluetooth
Bluetooth users face numerous threats, from inherent Bluetooth limitations that permit attacks like BlueSpoofing, to implementation vulnerabilities exploited by BlueJackers. Given the increasingly large number of laptops, PDAs and smartphones that incorporate Bluetooth interfaces, companies must understand and assess Bluetooth business risk and adopt appropriate countermeasures. In this tip, Phifer explores the security threats that face Bluetooth-enabled devices and how to mitigate them.

Podcast: Platform protection: Security issues for mobile devices
Length: 12 minutes
This podcast summarizes the security issues facing today's popular mobile device platforms, from Windows Mobile PDAs to BlackBerry smartphones. Find out where you can leverage recently improved operating system security measures and what may be the single most important security measure you can take to secure your organization's devices.

Quiz: Essential practices for securing mobile devices
Take this five-question quiz to see how much you've learned about securing mobile devices.

About the instructor:
@27447Lisa Phifer owns Core Competence Inc., a consulting firm specializing in network security and management technology. Lisa has been involved in the design, implementation and evaluation of data communications, internetworking, security and network management products for over 20 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. Before joining Core Competence, Lisa was a member of technical staff at Bell Communications Research where she won a president's award for her work on ATM network management.


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy