Mobile & Wireless Slideshow: 10 Steps CIOs Can Take to Bolster Mobile Security

By Don Reisinger  |  Posted 08-04-2010
Print this article  
10 Steps CIOs Can Take to Bolster Mobile Security

10 Steps CIOs Can Take to Bolster Mobile Security

Create A Use Policy - and Enforce itTell employees how they should use their smartphones. An effective use policy means there are no excuses for sensitive information leaks.
Now more than ever, companies are allowing their employees to use smartphones to connect to enterprise email and business intelligence so they can be productive while on the go. From a productivity perspective, smartphones have revolutionized the corporate world. Yet, there is a dark side to smartphones in the corporate computing environment that every CIO and IT staff worry about: Security. Some employees don't have the level of knowledge about security that the CIO does, and when these workers decide to browse the Web, they generally don't consider the ramifications of their actions. Now is the time to discuss mobile-security techniques designed to keep the company safe. If you follow these 10 simple steps, you should be well on your way to ensuring that all the sensitive data that malicious hackers want will not slip out while your employees are on the road.


Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.