Lisa Phifer's five-step plan for securing BYODs

Lisa Phifer's five-step plan for securing BYODs

Date: Feb 18, 2013

More from Lisa Phifer on BYOD security

Information Security magazine feature on BYOD security strategies: Balancing BYOD risks and rewards

SearchSecurity.com technical article: How to remotely wipe iPhone and Android devices

Like it or not, bring your own devices (BYODs) are increasingly present in the workplace, penetrating and bypassing carefully constructed corporate security perimeters. Where should an overworked, understaffed and budget-challenged IT security manager begin to battle this onslaught?

In this special video presentation, BYOD security expert Lisa Phifer lays out five steps that nearly any company can take to enable safe productive use of consumer smartphones, tablets and other mobile devices purchased by employees.

About the expert
Lisa Phifer owns Core Competence Inc., a consulting firm specializing in business use of emerging Internet technologies. Lisa has been involved in the design, implementation and evaluation of internetworking, security and management products for 30 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. She teaches about wireless LAN and mobile device administration and security, and has written extensively for numerous publications, including Information Security, SearchSecurity, SearchMobileComputing, TomsITPro, and Wi-Fi Planet. Phifer's insight columns and technical tips are published monthly by SearchNetworking and the AirWISE Community Security Center. She holds a Master of Science in computer science from Villanova University, and a Bachelor of Science in computer science from West Chester University.

More on Handheld and Mobile Device Security Best Practices

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: