O'Reilly logo

Mobile Security: A Pocket Guide by Steven Furnell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5: SAFEGUARDING YOUR DATA

Having considered the threats in a number of other contexts, this chapter stresses that the true value of mobile devices often comes from the data that they hold or that can be accessed through them. This leads to the need for measures such as encryption and back-up, which organisations should consider in order to properly safeguard against the threats.

Although much of the earlier discussion has referred to the protection of the device, this is ultimately just a means to an end. It’s actually not the device that we need to protect; it’s the data. Although the device has a financial value, it is ultimately replaceable. Meanwhile, the data may not be, and having it fall into the wrong hands may be far more ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required