Your Firm's Mobile Devices: How Secure Are They?

被引:3
|
作者
Wright, Harry R., Jr. [1 ]
Mooney, J. Lowell [2 ]
Parham, Abbie Gail [2 ]
机构
[1] Georgia Southern Univ, Legal Studies, Statesboro, GA 30460 USA
[2] Georgia Southern Univ, Accounting, Statesboro, GA 30460 USA
来源
关键词
D O I
10.1002/jcaf.20701
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
Mobile communication devices are taking the world by a storm. They offer significant benefits. But when deciding whether your company can benefit from giving mobile devices to employees, it is important to think strategically. Do you have a comprehensive mobile security strategy? Do you have a well-thought-out set of policies and procedures in place? The authors of this article take a critical look at mobile device security. Then they provide a detailed set of checklists to help you develop strategic goals; effectively manage mobile devices; protect company data; and evaluate the effectiveness of your security plan. (C) 2011 Wiley Periodicals, Inc.
引用
收藏
页码:13 / 21
页数:9
相关论文
共 50 条
  • [1] How Secure Is Your Mobile Health?
    Ferreira, Ana
    Almeida, Rute
    Muchagata, Joana
    [J]. XV MEDITERRANEAN CONFERENCE ON MEDICAL AND BIOLOGICAL ENGINEERING AND COMPUTING - MEDICON 2019, 2020, 76 : 1377 - 1384
  • [2] How to secure your company's manufacturing data
    Singer, BL
    [J]. BIOPHARM INTERNATIONAL, 2005, 18 (12) : 48 - +
  • [3] How Secure is Your Hospital's Front Door?
    Clark, John
    [J]. INFORMATION SECURITY JOURNAL, 2008, 17 (04): : 201 - 202
  • [4] How green is your firm?
    不详
    [J]. PROCESS ENGINEERING, 1996, 77 (12) : 3 - 3
  • [5] An architecture for secure mobile devices
    Mayrhofer, Rene
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (10) : 1958 - 1970
  • [6] For your phone only: custom protocols for efficient secure function evaluation on mobile devices
    Carter, Henry
    Amrutkar, Chaitrali
    Dacosta, Italo
    Traynor, Patrick
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (07) : 1165 - 1176
  • [7] How secure is your tube?
    Yarrow, S.
    Muddle, S.
    Stone, R.
    [J]. EUROPEAN JOURNAL OF ANAESTHESIOLOGY, 2004, 21 : 6 - 6
  • [8] How Secure Is Your Practice?
    Dirubbo, Nancy E.
    [J]. NURSE PRACTITIONER, 2008, 33 (04): : 6 - 6
  • [9] How secure is your machine?
    Chen, CY
    [J]. FORTUNE, 2004, 150 (08) : 268 - 268
  • [10] How secure is your job?
    Rosenweig, M
    [J]. CHEMICAL ENGINEERING PROGRESS, 1997, 93 (04) : 80 - 80