Project Guide: Managing Mobile Device SecurityBy Baselinemag | Posted 2006-05-18 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
Until the last year or so, the biggest worry about managing mobile devices was loss or breakage. Those days are goneforever. With so much sensitive information now on portable devices, securing them has become a major concern.
Technology and telecom managers are increasingly tied up keeping track of smart phones, personal digital assistants and other devices. Baseline¹s Project Guide offers tips for managing and securing these devices.
In this mobile security guide:
Job 1: Protect Mobile Data, Not Hardware
Lost or broken mobile devices are no longer headache No. 1 for I.T. execsit's securing critical data on the new generation of handhelds.
Unilever Builds Mobile Security from Scratch
Giving handhelds to 1,000 executives around the globe wasn't easybut it let Unilever establish its wireless policy from the ground up.
10 Steps to Mobile Security
Lacking a policy to secure mobile devices or protect critical data that's stored on them? Here are 10 steps to shore up your defenses.
Calculator: Costing Out Mobile Device Security
Cell phones and PDAs are easy prey for viruses and other malwareunless you fortify them with third-party applications. HereÕs how much it will cost you.