Steps for Achieving Proper Mobile Security Governance

14.05.2009

* What are the corporate mobile data assets that require protection?

* What, how and where the corporate data systems are accessed by mobile employees?

* How mobile devices are being used, protected and managed?

* Do employees know the procedures in responding to an incident?

To fully determine an organization's mobile security posture, a comprehensive security assessment against an organization's specific business environment is needed.