Mobile Computing: Securing Your Workforce

  • 1h 5m
  • BCS, The Chartered Institute for IT
  • BCS
  • 2011

Mobile Computing - Securing your Workforce is a book that comprises 14 short essays on the subject of mobile computing in the workplace. Contributors include senior professionals in industry and commerce, the public sector and individual members of BCS.

Each essay comprises only a few pages, summarising the main points that the author wishes to make in their knowledge area, in a book that is less than 50 pages in total.

The essays span a two-year period commencing October 2009 through to October 2011, with most being written in the spring/summer of 2011. Despite the passage of time, the book remains topical.

It covers our love of mobile devices, and provides sound advice and guidance for both consumers and the hard-pressed ICT department in the balance to get the best return out of the mobile devices, without compromising corporate security standards.

The brevity of each article allows the author to convey only an overview of the subject matter; however this does mean that it is easy to dip in and read an essay completely in a 10 minute break.

The best essays cover the topical issues surrounding equipping employees to maximise their potential, looking at the governance issues in mobile computing, the emergence of the software virus and malware in this sector and of course the ‘Bring Your Own Device [to Work]’ (BYOD) explosion.

Some essays will be more interesting than others, depending on the reader’s area of interest. One or two essays are particularly specialist, and perhaps don’t sit as well in this book as the majority - considering the general awareness mission to which the book is pitching.

If nothing else the reader should enjoy this wide-ranging cornucopia of material, my particular favourites being ‘NFC: another one for the Acronym Soup’ - that’s Near Field Communication in case you were wondering - and a witty yet thought-provoking piece from Jane Grafton teasingly promoted as a case study of Mobile Rules for Security Officers.

The ‘Useful Links’ in the appendix covers research and articles that the reader can follow up on, provides the web addresses of three key security organisations in the marketplace, a handful of blogs to while away the time plus an article from BCS on top security tips. And a little gem to finish with points the reader to a website containing the top 500 worst passwords of all time!

In this Book

  • Equipping Employees, Maximising Potential
  • Consumer Devices in the Workplace: A Best-Practice Security Approach
  • Security on the Move
  • Mobile Security: Minimising Risk, Maximising Awareness
  • Delivering Security on Employees' Personal Laptops
  • Safety Training for the Workforce
  • CEOs in the Dock
  • Stopping the Mobile Bot Threat
  • Password Security
  • Encryption is Sometimes not Enough
  • NFC: Another One for the Acronym Soup
  • Network Security When Going Mobile
  • Improving Your Network and Application Assurance Strategy
  • Mobile Rules for Security Officers: A 'Case Study'
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)
Rating 4.8 of 66 users Rating 4.8 of 66 users (66)