Mobile computing securing your workforce

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics include: personal mo...

Full description

Bibliographic Details
Corporate Author: BCS, The Chartered Institute for IT (-)
Format: eBook
Language:Inglés
Published: Swindon, U.K. : British Informatics Society Litd 2011.
Edition:1st edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628092706719
Table of Contents:
  • Copyright; CONTENTS; FOREWORD; 1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL; WHAT IS A 'BETTER CONNECTED' WORKFORCE?; 'PROSUMERISATION'; WHAT ARE THE BUSINESS DRIVERS?; LOOKING FORWARD; ENSURING SAFE END-USER ADOPTION; CONCLUSION; 2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH; PUTTING THE RIGHT TOOLS IN PLACE; 3 SECURITY ON THE MOVE; NOTES; 4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS; THE LEGAL MINEFIELD; THE LAYERED SECURITY MODEL; DETERMINING THE SECURITY RISK; PERSONAL RESPONSIBILITY; 5 DELIVERING SECURITY ON EMPLOYEES' PERSONAL LAPTOPS
  • BENEFITS OF BRING-YOUR-OWNSECURITY DRAWBACKS; PLUG-IN SECURITY; VIRTUAL WORKSPACES; ASSESSING THE BENEFITS; NOTES; 6 SAFETY TRAINING FOR THE WORKFORCE; HOW BIG IS THE ICEBERG?; IT'S AS IF NO ONE CARES; THE TIME HAS COME FOR ACTION; 7 CEOs IN THE DOCK; SMARTPHONES ARE MINICOMPUTERS; SENIOR MANAGERS ARE PERSONALLY LIABLE; TAKING SECURITY MEASURES; ARE BUSINESS PEOPLE BREAKING THE LAW?; 8 STOPPING THE MOBILE BOT THREAT; LACK OF SECURITY; MALWARE LAUNCH PAD; BLENDED THREATS; 9 PASSWORD SECURITY; ENFORCING STRONGER PASSWORD POLICIES; PASSWORD SECURITY DOES NOT HAVE TO BE A PAIN; HIGHER RISK GROUPS
  • TYPES OF ATTACKS10 ENCRYPTION IS SOMETIMES NOT ENOUGH; RISK-RISK TRADE-OFFS; THE EFFECTS OF ENCRYPTION; NOTES; 11 NFC: ANOTHER ONE FOR THE ACRONYM SOUP; 12 NETWORK SECURITY WHEN GOING MOBILE; NAC = RIP AND REPLACE; NAC = ANOTHER BRICK IN THE WALL; NAC = THE SECURITY ORCHESTRATOR; 13 IMPROVING YOUR NETWORK AND APPLICATION ASSURANCE STRATEGY; THE 0DAY MENACE; TIERED APPROACH; NOTES; 14 MOBILE RULES FOR SECURITY OFFICERS: A 'CASE STUDY'; MOBILE RULES; USEFUL LINKS; RESEARCH AND ARTICLES; ORGANISATIONS; BLOGS; OTHER