Smartphones and tablets may receive infrequent updates and can be difficult to manage.
An article review.
Your desktop receives new virus definitions and other updates on what seems like an hourly basis, but when was the last time your smartphone received an OS update?
...
by Sean Waugh and Dan Hadaway
First, let us confess that we used BYOD in the title merely so that we’d catch everybody’s attention. It’s a nice buzzword; who wouldn’t feel like partying after seeing it?
But this article is actually about Portable Devices, which is a super...
47% of Mobile Device Users have screen lock disabled!
Persisting Threat of BYOD and Mobile Devices
Just when you think progress is being made in educating employees about BYOD security vulnerabilities, another survey releases results like this: In a 400 person survey o...
Using mobile devices in the workforce has grown in popularity. However, some organizations haven’t jumped to purchasing those devices. Some employees, either out of need or convenience, have used an alternate route in that they bring their own device (BYOD) to wor...
Securing Mobile Devices
Note: Click for a pdf version of this Securing Mobile Devices White Paper.
This white paper addresses the risks associated with the relatively new phenomena surrounding the introduction of corporate-owned data on Portable Devices, currently known...
IT Governance Map for Portable Devices
The auditors at infotex have created a set of non-technical controls (ie: policies and procedures) governing the use of mobile devices. This white paper (Mobile Security White Paper: Non-technical Controls) discusses considerations...
Everything you need to write your BYOD policy (Bring Your Own Device policy) and procedures for Mobile Devices Security all in one kit! It can scale to smaller banks simply wanting to take advantage of resources already available (such as Exchange ActiveSync); but it also...
Portable Devices Configuration Standards: This document establishes all the technical security standards that must be met to properly enforce the modified Acceptable Use Policy and high-level IT governance policy as well as, of course, the Portable Devices Security Proce...
Portable Devices Audit Checklist: This three-part checklist assists your technical team (or whomever is identified in your policy statement) in auditing both BYOD (authorized) devices and company-owned devices. It includes an asset inventory as well as a checklist for sm...
The FFIEC is clear about the need to conduct risk assessments focused on the deployment of new technologies. This document is an asset-based drill-down risk assessment that can be used to establish inherent and residual risk on vulnerabilities to smartphones (iPhones, And...