Protecting data must take priority in a BYOD world.

Handheld and Mobile Device Security Best Practices

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Is your mobile security strategy combating the wrong enemy?

    As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too often, their efforts are focused on combating malware instead of vulnerable applications, advanced a... 

  • What's the best focus for MDM strategy now?

    This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost, stolen or hacked. That's a given. This guide outlines the basic tenets of sound strategy for mobile... 

  • Insider edition: Layering mobile security for greater control

    Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees from bringing their own technology into the workplace doesn't work. While no single tool exists to sec... 

  • The rapid evolution of MDM solutions

    Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the rapid turnover in consumer mobile technology, have left many organizations grappling with MDM requirem... 

  • Seven Outstanding Security Pros in 2012

    Find out who won this year’s Security 7 Award, which honors outstanding security professionals in seven vertical markets. Also in this issue, we examine the pros and cons of the Metasploit penetration testing framework, and ways to overcome cloud com... 

  • Strategies for tackling BYOD: How to ensure mobile security

    Bring your own device (BYOD) and the consumerization of IT are realities of the modern workplace that cannot be ignored. When employees are empowered with the choice of using their own consumer-based devices in the workplace, it is imperative to coun... 

  • An inside look at network security technologies

    Finding malware, or worse, attackers pivoting from server to server on your network, is a difficult proposition. Persistent, motivated hackers are adept at developing code that evades detection from signature-based network security devices. And more ... 

  • New security strategies for the bring-your-own-device era

    Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top cons... 

  • BYOD means creating a new security game plan in the enterprise

    This month's Information Security magazine online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to f... 

  • secure container

    A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps. The purpose is to prevent malwar... 

  • madware

    Madware is a type of aggressive advertising that affects smartphones and tablets. The name, which is a portmanteau combining the words mobile and adware, was coined by the security vendor Symantec to describe a type of intrusive advertising that curr... 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • Surface (Microsoft Surface tablet)

    Surface is a line of tablet computers from Microsoft. Surface tablets will have a 10.6-inch wide display and come with USB support, dual Wi-Fi antennae, a built-in kick stand and a keyboard that doubles as the tablet’s cover.  

About Handheld and Mobile Device Security Best Practices

Enhance handheld security in several ways, such as encryption, to prevent hacker attacks, threats, flaws and vulnerabilities on your BlackBerry, iPhone, Bluetooth, Windows, Symbian, Palm and all other mobile devices.