The word “Mobile,” synonymous with Mobile Computing or Mobility refers to remote workers, laptop computers and USB memory sticks (thumb drives). In years past, organizations routinely provisioned employees with both, as employees routinely have need or wanted to use their personal laptops and USB sticks for business purpose. Therefore, companies had to deal with a mix of business and personal mobile computing devices. In those days, security advisory services from leading security companies such as Unatek recommended that its clients create strong “personal use” policies, promote awareness of the risks, and deploy technology measures to mitigate some those risks. But, today’s mobile discussion is similar in theme but quite different in details.
Whether it is mobility or mobile computing, “Mobile” no longer merely means mobile computing or mobile workforce. Its common use now includes social networking, mobile websites, mobile apps, new messaging and communication platforms, photos, crowd sourcing, and videos used for personal and business reasons on a vast range of technologies including home PCs, corporate workstations, laptops, smartphones and tablets on the business network, the home Internet connection and in the Cloud.
The domain and technology eco-system of Mobile is vast. Phones, cameras, PDAs, laptops, portable storage devices (external storage, iPods, memory sticks) and tablets are all included, so also are computers, servers and entire data centers. The glue that connects all of these systems in the Mobile conversation is simply one thing: The Internet. Mobile touches nearly every aspect of your IT environment.
So, what do organizations and users need to know in order to approach Mobile with reasonable security? That is the subject of Unatek’s white paper: The Secure Mobile Enterprise. Download it here at http://unatek.com/whitepapers.