article thumbnail

Mobile device security policy

Tech Republic Security

PURPOSE This Mobile Device Security Policy from TechRepublic Premium provides guidelines for mobile device security needs in order to protect businesses and their employees. This policy can be customized as needed to fit the needs of your organization.

Policies 145
article thumbnail

Mobile Device Security Policy

Tech Republic Security

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. Desktops are routinely stationary devices and laptops are harder to lose than smartphones or tablets, being more sizable.

Mobile 146
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MobileIron: Corporate IT policy and mobile device security are mismatched

Computer Weekly

MobileIron report identifies a gap between security policy and the actual deployment of that policy on mobile devices

Policies 155
article thumbnail

Verizon finds companies relaxed mobile security policies to get employees online

Venture Beast

Nearly half of businesses sacrificed mobile device security in the rush to get employees set up and able to do their jobs, Verizon said. Read More.

Mobile 126
article thumbnail

Transmission of Sensitive Data Policy

Tech Republic Security

Data stored inside a securely monitored environment is much less likely to fall into the wrong hands than data exchanged between people and systems. Data in transit means data is at risk if the proper precautions aren’t followed. With this in mind, it is essential for company personnel to adhere to firm and clear guidelines.

Policies 139
article thumbnail

Automation For The Better Good - Security

Forrester IT

However, if you asked the most diehard Luddites if they were ready willing to give up the following: Depositing a check using a mobile app. What these tasks have in common (in addition to relying on automation): a critical dependence on security. Information Security. Security Operations & Program Governance.

Security 346
article thumbnail

Transmission of sensitive data policy

Tech Republic Security

Data stored inside a securely monitored environment is much less likely to fall into the wrong hands than data exchanged between people and systems. The post Transmission of sensitive data policy appeared first on TechRepublic. Data in transit means data is at risk if the proper precautions aren’t followed.