ABSTRACT

In this entry, we review some of the many threats and risks that exist today to mobile devices of all shapes and sizes. From USB memory drives to laptops and from traditional mobile phones to smart phones, we discuss available controls and safeguards that can be implemented to reduce the overall level of mobile device risk, and we discuss tips to help audit and assess the overall security of an organization’s mobile device infrastructure.