Nine ways to secure mobile devices

Tools

Given all the continuing news and warnings about the insecurity of wireless and mobile devices, it is comforting to find that there are some substantial things enterprises can do to secure mobile technologies. Not surprisingly, the first step, as with any type of computing security initiate, is to educate today's mobile device users about security issues, best practices and their role in the security chain of command. On the IT side of the equation, security leaders have to build a solid mobile management system, decide access rights to critical and valuable files and networks, and enable lock-down or "kill" features in the event a laptop or handheld data device goes missing. Those are just four of nine good security practices organizations can use to keep mobile computing and wireless connectivity secure. Article