More than malware: The battle for mobile security

Handheld and Mobile Device Security Best Practices

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Remote phone lock and GPS tracking counter smartphone security risks

    Lost or stolen smartphones pose serious security risks to data, but remote device lock technology and GPS tracking can help mitigate those risks. This is the first of two parts. 

  • Smartphone security: The growing threat of mobile malware

    The increasingly pervasive use of wireless handhelds in the enterprise is just one reason why malware pros are getting serious about mobile malware. Lisa Phifer details all the reasons why smartphone and PDA viruses and malware may be on the rise, an... 

  • Recovering stolen laptops one step at a time

    When a student's laptop was stolen last year on a university campus, police and IT investigators went to work, recovering it within a matter of weeks. Neil Spellman, one of the investigators on the case, offers some best practices on what to do if a ... 

  • Employee-owned handhelds: Security and network policy considerations

    Consumer use of iPhones, smartphones and other handhelds has exploded in recent years, and naturally more employees want to use them for business. With today's growing number of personally owned devices on the network, enterprises must adapt their po... 

  • Policies for reducing mobile risk

    As the use of employee-owned mobile computing devices increases, so do the risks they pose to corporate networks and data. In this tip, Lisa Phifer outlines the essential components of an information security policy that deals with mobile devices -- ... 

  • Mobile device security in six simple steps

    By now, most information security professionals understand why enforcing laptop security is crucial to securing enterprise data. However, laptops aren't the only mobile devices that enterprises need to lock down. In this tip, Mike Chapple explains wh... 

  • Secure remote access: Closing the Windows Mobile Smartphone loophole

    After years of waiting, smartphones are finally being used to access corporate networks. But security programs for Windows laptops won't run as-is on Windows Mobile devices, leading users to engage in risky behavior. In this tip, Core Competence's Li... 

  • iPhone security in the enterprise: Mitigating the risks

    Since its flashy launch in June 2007, the Apple iPhone has certainly garnered a great deal of buzz. Almost immediately, hackers searched for exploitable flaws in the product, and they weren't disappointed. In this tip, Ed Skoudis examines iPhone-spec... 

  • Bringing the network perimeter back from the 'dead'

    In the past year, a number of security professionals from consulting firms have expressed the importance of endpoint security, going so far as to say the perimeter is dead. Not so fast, offers network security expert Mike Chapple. In this spirited ti... 

  • Expanding antivirus to include the mobile enterprise

    If your organization has yet to add mobile devices to its antivirus management strategy, it may be overlooking a tempting attack vector. As Sandra Kay Miller explains, it's not only necessary that PDAs, smartphones and other mobile devices have const...