CHAPTER 5: SAFEGUARDING YOUR DATA
Having considered the threats in a number of other contexts, this chapter stresses that the true value of mobile devices often comes from the data that they hold or that can be accessed through them. This leads to the need for measures such as encryption and back-up, which organisations should consider in order to properly safeguard against the threats.
Although much of the earlier discussion has referred to the protection of the device, this is ultimately just a means to an end. It’s actually not the device that we need to protect; it’s the data. Although the device has a financial value, it is ultimately replaceable. Meanwhile, the data may not be, and having it fall into the wrong hands may be far more ...
Get Mobile Security: A Pocket Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.