Mobile Devices

Digiknow mobile devices, on average, are used five hours per day? "Mobile Device" refers to handheld computers, tablets, and smartphones. These devices are full of business and personal information that is convenient to access at any time, but the devices are small and easy to steal or be misplaced. Unfortunately, security controls have not kept pace with the risks posed by mobile devices. On this page you will find tips and tools to help you secure your mobile device and mitigate the risks of loss of private data.

link to ACA Compliance Group
Being Smart About Your Smart Phone


Definitions and General Information

  • Best Practices: Security your Mobile Device
  • Disposing of your Mobile Device: Thinking of upgrading to a new mobile phone or device? Maybe returning one that didn’t work out for you? It’s important to delete any personal information you stored on the device.
  • Don’t Get Juice Jacked at the Airport, this video provides best practices to protect your personal information at the airport.
  • Five new threats to your mobile security: Cyber criminals are stepping up their attacks on mobile devices with new weapons and variations on old ones.
  • Mobile Device Security: Organizations understand the value mobile devices can add to their employees’ productivity by providing access to business resources at any time. Not only has this reshaped how traditional in-office tasks are accomplished, but organizations are devising entirely new ways to work.
  • Mobile Security (wireless security): Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.
  • Risks to Mobile Phones and Tablets: Includes steps to take before and after a device goes missing as well the safe disposal of your device to remove sensitive data.
  • The top 5 mobile security threats: Leaky apps, click-happy smartphone users and sneaky malware make for a toxic combo.
  • So you bought your kid a smart phone . . . now what? Here are 8 Rules for Safe Smart Phone Use.
  • How the iPhone begat shadow IT and enterprise mobility: Steve Palmucci remembers suddenly seeing new iPhones show up at work, and he immediately worried about its lack of security and business capabilities. Nevertheless, employees seemed to love them, and made it clear they wanted to use them for work.