How to write an effective enterprise mobile device security policy

Expert Lisa Phifer explains the process for creating a winning enterprise mobile device security policy that reduces the risk of mobile data threats. <img alt="How to write an effective enterprise mobile device security policy, Blog, Security, write., Enterprise, Mobile, policy, device, effective"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post…

read more

Loss of BlackBerry, security benefits would hurt enterprise mobile security

Opinion: BlackBerry security has been a boon to enterprises, and unless security pros help save the platform, enterprise mobile security will suffer. <img alt="Loss of BlackBerry, security benefits would hurt enterprise mobile security, Blog, Security, BLACKBERRY, would, Enterprise, Mobile, Loss, hurt, benefits"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post…

read more

Enterprise must protect against malware with BYOD rise

Businesses have been lax to implement defence mechanisms against malware on mobile devices, despite the acceleration of the ‘bring-your-own-device’ (BYOD) trend in the workplace. Addressing attendees at the Australian Information Security Association (AISA) 2011 conference in Sydney, Lumension security and forensics analyst, Paul Henry, said the trend of staff bringing…

read more

Windows vs. Mac security: An enterprise endpoint security comparison

Expert Mike Chapple explores the security implications of running Macs on the corporate network in a side-by-side comparison of Windows vs. Mac security. <img alt="Windows vs. Mac security: An enterprise endpoint security comparison, Blog, Security, Enterprise, Endpoint, Windows, Comparison"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/> View full post on SearchSecurity: Network…

read more