The exponenial growth of mobile usage and advances in mobile technology, has led to a gap between device security and user expectation. This is an area where the bad guys are clearly winning and industry informtion security managers have work to do in order to secure their organisation’s mobile devices and mitigate risk to the company. This week’s video offering was prompted by Jason Holloway from Bridgestone Security, one of our new Channel Partners, we met Jason at Infosecurity Europe 2011. Our video offers 5 key steps which should form the basis of your mobile policy strategy.
Jason, thanks for the inspiration. Lynn.