Defining a mobile security policy is an essential step towards reducing business risk. Of course, the next step is to implement that security policy by deploying required mobile security measures. This Special Report from SearchMobileComputing.com will help you formulate and enforce an official mobile policy.
Mobile policies: Secure your corporate data with acceptable use policies
Craig Mathias explains why IT managers need to take a very proactive look not just at the technologies of mobile computing, but also at the policies regarding their use.
Policies for mobile computing
The advice in this column will help you define your needs and understand the core requirements every organization should have in place, regardless of your mobile penetration.
Policies for reducing mobile risk
Lisa Phifer outlines the essential components of a security policy that deals with mobile devices -- both employee and company owned -- and their associated business risks.
Mobile security policy useless if not enforced
Strong mobile policies have become necessary to ensure mobile security. But security policies aren't worth the paper they're printed on if they're not enforced.
Mobile security starts with policy
Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.
Mobile Messenger Audiocast – Policies for managing mobility
In this podcast, SearchMobileComputing's Andrew Hickey and Daniel Taylor of the Mobile Enterprise Alliance discuss the steps that IT departments should take to develop a set of policies for managing mobility in their organizations. (This podcast is approximately 30 minutes long and we ask your patience while it uploads.)
Listen on your PC or download to your favorite mobile device.
Download this podcast here
Visit SearchMobileComputing.com often to keep abreast of recent developments in enterprise mobility.
This was first published in January 2007