hspace=3 alt="Mobile Device Use" vspace=3 align=right
src="http://www.e-janco.com/images/MobileUsesm.png" width=85 height=110>By
definition, mobile devices are extending beyond corporate physical security controls and data on
devices or transmitted over public Wi-Fi networks is at risk.  Security is
a key concern for CIOs as they begin to implement mobile device solutions. 
Over two thirds of all CIO, according to Janco Associates, Inc. , feel that
security of mobile devices is the largest risk to deal with when building a
mobility strategy.


alt="Order Mobile Device Access Use Policy"
src="http://www.e-janco.com/images/Order.gif"> alt="Sample Outsourcing Policy"
src="http://www.e-janco.com/Images_new/Download.gif" width=206
height=22>


Lost or stolen devices are the most common type of mobile security
incident today. How many times have we heard in the media that an employee of a
hardware vendor loses a device in a bar or cab before it is released?  Add
to this, unauthorized applications or malware targeted at mobile devices that do
put corporate systems at risk. 

Resources
Post Your Resume to 65+ Job Sites
Resume Service

Post to Twitter Tweet This Post