In today’s rapidly changing world, information and the technology used to collect, store, and process this information is becoming portable. Not like traditional wired based systems, these new technologies move outside the internal network defenses and are subject to new threats. This is why it is important for organizations to understand that critical corporate data can be exposed if desktop PC defenses are used and handheld device security is solely the responsibility of the end-user (Friedman, 2008).
Mobile device policies, addressing both business and technical requirements, are essential to define and apply administrative and security practices to the ever-growing assortment of devices in the hands of users. Failure to bring the organization’s mobile device policies and security objectives up to date and into alignment poses immediate and serious risks to information security and can jeopardize a company’s ability to meet compliance requirements. Mobile devices are a cost of doing business, and the only way to get superior results is to have a superior mobile device policy (Girard, 2011).
The purpose of this site is to provide assistance to organizations in planning, developing, and implementing mobile device policy. We designed this site not only for informational purposes but also to inspire an online dialog about mobile device policy. Please participate in this dialog by using the comment sections provided throughout the site.
If you are interested, the following video is a great discussion about mobile device security in the enterprise.