Training is an important, early step in any process; informing end-users of the need to secure their mobile devices is critical. Recommended training topics: ● Why we need to authenticate and encrypt ● How to reduce the risk of loss or theft ● How to safely deploy new applications ● How to securely backup your data Authenticate and encrypt […]
https://www.bryley.com/wp-content/uploads/logo-340-300x79.png00Gavin Livingstonehttps://www.bryley.com/wp-content/uploads/logo-340-300x79.pngGavin Livingstone2012-07-30 20:09:372018-07-03 11:29:02Protect your mobile device – Part 2: Training
The need to secure newer mobile devices (smartphones, tablets, etc.) has grown since they now meet the basic criteria for malicious, cyberspace-based attack: Developer kits are readily available Mobile devices are in widespread use throughout the world Motivation is increasing since usable/saleable data live on these devices In addition, BYOD (Bring Your Own Device) […]
https://www.bryley.com/wp-content/uploads/logo-340-300x79.png00Gavin Livingstonehttps://www.bryley.com/wp-content/uploads/logo-340-300x79.pngGavin Livingstone2012-07-05 19:38:452018-07-03 11:29:11Protect your mobile device – Part 1
Protect your mobile device – Part 2: Training
/in Blog Post, Mobile, Security /by Gavin LivingstoneTraining is an important, early step in any process; informing end-users of the need to secure their mobile devices is critical. Recommended training topics: ● Why we need to authenticate and encrypt ● How to reduce the risk of loss or theft ● How to safely deploy new applications ● How to securely backup your data Authenticate and encrypt […]
Protect your mobile device – Part 1
/in Blog Post, Mobile, Security /by Gavin LivingstoneThe need to secure newer mobile devices (smartphones, tablets, etc.) has grown since they now meet the basic criteria for malicious, cyberspace-based attack: Developer kits are readily available Mobile devices are in widespread use throughout the world Motivation is increasing since usable/saleable data live on these devices In addition, BYOD (Bring Your Own Device) […]