President IP Architects, LLC and Advisor with ISACA
Mobile devices are quickly becoming a target rich and high return on investment environment for malicious attackers. Their use is expected to surpass the use of existing laptops and desktop computers by a factor of at least three in the next five years. The rapid innovation that is often associated with these devices also means that in the near future they are expected to have expanded capabilities, including touch less payments, personal data repositories, fully functional local applications, and the ability to simultaneously enable high-speed access to corporate and personal networks and applications. There are numerous behaviors and capabilities that users can adopt to help them mitigate risks and enhance the security of mobile devices without introducing debilitating restrictions or limiting functionality that make them less useful. This article will discuss five of the more useful ones.
- JOHN P.PIRONTI, CGEIT, CISA, CISM, CISSP, CRISC, ISSAP, ISSMP
- InfoSecurity
- Posted On




