O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summing it up

These are the steps that you, as a user, can take in the event of a hack. Most importantly, each user should be aware of the steps to take depending upon the exact nature of the security risk. By preparing a list tailored for each type of malfunction or hack, you can more efficiently resolve any security compromises.

The second primary component to resolving a mobile security compromise relates to whether a device is a BYOD, an employer-owned device, or a personal device. If it is either a BYOD or an employer-owned device, the employer may enforce a policy of conducting partial or complete wipes of the device to protect corporate data.

While undesirable, a successful hack does not necessarily incur significant damage to your device ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required