Chapter 4. Mobile Security
Before you get started with the deployment of your mobile devices, you need to fully understand the risks associated with Mobility and what you can do to best secure the devices for your users. With the ever-growing threat of cyber-crime and the continued increase of data leakage, we need to provide the best possible security available. At the same time, we also need to be conscious of the usability of the mobile solution. If we secure something to a level that makes the solution unusable, the users will circumvent the controls and find other ways to get what they need. This in turn creates more risk to the environment. With this, we need to ensure that the mobile solution being provided is secure, meets regulations, and is also a solution that allows the users to easily use and adopt.
We will first go into an overview of Mobile Security to better understand the vulnerabilities and risks associated with it. We will then take a look at the industry compliances...