2011
DOI: 10.1002/jcaf.20701
|View full text |Cite
|
Sign up to set email alerts
|

Your firm's mobile devices: How secure are they?

Abstract: Mobile communication devices are taking the world by a storm. They offer significant benefits. But when deciding whether your company can benefit from giving mobile devices to employees, it is important to think strategically. Do you have a comprehensive mobile security strategy? Do you have a well‐thought‐out set of policies and procedures in place? The authors of this article take a critical look at mobile device security. Then they provide a detailed set of checklists to help you develop strategic goals; ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 0 publications
0
1
0
Order By: Relevance
“…Wilshusen and Barkakati (2012) described the key technical mobile device security controls and the key user practices necessary to combat common threats and vulnerabilities. These measures were also found in several other literature (FBI, 2012;Friedmana & Hoffmanb, 2008;IC3, 2012;NIST, 2012;Rose, 2013;US-CERT, 2011a;US-CERT, 2013a;US-CERT, 2013a;Wright et al, 2011). The key security controls (Wilshusen & Barkakati, 2012), listed below, are the system features that can be set (enabled or disabled, locked or unlocked) on mobile devices to help protect against common security threats and vulnerabilities.…”
Section: Key Mobile Device Security Measuressupporting
confidence: 82%
“…Wilshusen and Barkakati (2012) described the key technical mobile device security controls and the key user practices necessary to combat common threats and vulnerabilities. These measures were also found in several other literature (FBI, 2012;Friedmana & Hoffmanb, 2008;IC3, 2012;NIST, 2012;Rose, 2013;US-CERT, 2011a;US-CERT, 2013a;US-CERT, 2013a;Wright et al, 2011). The key security controls (Wilshusen & Barkakati, 2012), listed below, are the system features that can be set (enabled or disabled, locked or unlocked) on mobile devices to help protect against common security threats and vulnerabilities.…”
Section: Key Mobile Device Security Measuressupporting
confidence: 82%
“…In our last article, Your Firm's Mobile Devices: How Secure Are They? (Wright, Mooney, & Parham, ), we reviewed eight security tools and discussed several best practices for securing mobile devices. We also described strategic goals related to mobile devices, provided guidance on the effective management of mobile technology, and discussed the advantages of creating a mobile device audit plan.…”
Section: Introductionmentioning
confidence: 99%