Skip to main content

Mobile Device Security For Dummies

Mobile Device Security For Dummies

Rich Campagna, Subbu Iyer, Ashwin Krishnan, Mark Bauhaus (Foreword by)

ISBN: 978-1-118-09380-1

Jul 2011

408 pages



The information you need to avoid security threats on corporate mobile devices

Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate information.

  • Provides a practical, fast-track approach to protecting a mobile device from security threats
  • Discusses important topics such as specific hacker protection, loss/theft protection, backing up and restoring data, and more
  • Offers critical advice for deploying enterprise network protection for mobile devices
  • Walks you through the advantages of granular application access control and enforcement with VPN

Business can be mobile without being vulnerable?and Mobile Device Security For Dummies shows you how.

Introduction 1

Part I: Living Securely in the Smart World 7

Chapter 1: What’s So Smart About a Phone, Anyway? 9

Chapter 2 : Why Do I Care? The Mobile Device Threat 33

Chapter 3 : Planning for Mobile Devices in the Enterprise 57

Part II: Implementing Enterprise Mobile Security 77

Chapter 4: Creating Mobile Device Security Policies 79

Chapter 5: Managing and Controlling Devices 105

Chapter 6: Conforming to Corporate Compliance Policies 127

Part III: Securing Smart Device Access 147

Chapter 7: Securing Data in Transit with VPNs 149

Chapter 8: Connecting to Wi-Fi Networks 177

Part IV: Securing Each Smart Device 187

Chapter 9: Device Security Component Overview 189

Chapter 10: Hacker Protection and Enforceable Encryption 209

Chapter 11: Protecting Against Loss and Theft 233

Chapter 12: Educating Users about Backing Up Data 247

Chapter 13: Securing Mobile Applications 263

Part V: The Part of Tens 273

Chapter 14: Top Ten Online Information Sources 275

Chapter 15: Top Ten Mobile Security Vendors 279

Index 283

Bonus Content Download