Mobile workers are the weakest link the security chain. Nick Garlick says that mobile security is not an oxymoron.
Securing the mobile device
โ Scribed by Bruce Potter
- Publisher
- Elsevier Science
- Year
- 2004
- Tongue
- English
- Weight
- 98 KB
- Volume
- 2004
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Phishing is on the move. Cyber criminals are continually trying to find new ways to catch users off-guard. This may include new technological developments or it may simply mean using some topical 'hook' to beguile users. Here is a roundup of where it is today.
## Securing the Global, Remote, Mobile User Electronic commerce is inevitable and will reshape our lives, but before true electronic commerce environments can be realized, it will be necessary to secure your enterprise against outside attacks on its electronic information and provide controls for
## Anytime, anywhere on any device Marketing tells us that a new era of mobility has just begun. Millions of socalled Personal Digital Assistants (PDA) have been sold over the past few years. Together with other mobility technologies like notebooks, mobile phones, wireless LAN, Bluetooth etc. they
## Abstract Mobile communication devices are taking the world by a storm. They offer significant benefits. But when deciding whether your company can benefit from giving mobile devices to employees, it is important to think strategically. Do you have a comprehensive mobile security strategy? Do you