It's no secret that mobile devices in the work place are changing the way people and organizations address security. CA Veracode's Marketing department has developed an eBook to help educate people on how to protect themselves against security risks when bringing their own devices to work.
To download the eBook, CLICK HERE
In addition, we’ll present the Top 10 Mobile Security Tips from this eBook in-person to your employees, for Free! Attendees will leave the 90-minute seminar with a clear understanding of today’s mobile computing threats, a customized hardcopy edition of the e-Book, and the know-how to do their part to protect your company. CLICK HERE for more details.
I’ve already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that’s here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only -- meaning 77 percent of employees are using their own devices in some capacity to do their job. As the Chief Information Security Officer (CISO) at CA Veracode I have experienced this trend firsthand and if it hasn’t hit you yet, the BYOD tidal wave is coming your way!
CA Veracode's Marketing Department has created this mobile security book to help you successfully ride that wave. After reading this book you and your employees will learn, as we have at CA Veracode, it takes a coordinated effort between employees and IT/security personnel to truly secure mobile computing in the enterprise.
Formulating a BYOD policy is only one side of the equation – employee education is the other. Most business users simply aren’t aware of the security threats facing them when they use their favorite mobile device at work. This book aims to increase that threat awareness level and ultimately convert your employees into willing participants in your organization’s secure mobile computing or BYOD program.
This book lists 10 simple things that every business user can do to help protect their personal information as well as their company’s data, IP and brand when they use their mobile devices at work. We’ve made every effort to make our mobile security story a fun one to read. Some of the details around the mobile security stack can be tedious, but it’s hard to resist when the stack looks like a club sandwich!
I hope you and your employees find this book helpful, and I encourage you to share it with your colleagues.
Written by: Chris Wysopal