Mobile security starts at the top

As it goes, it was a pretty embarrassing blunder. Somehow, back in 2000, a laptop belonging to Irwin Jacobs, CEO of chip maker Qualcomm, was stolen from the podium right after he'd made a speech at a conference.

As Jacobs later admitted, the PC contained data that could be of great value to "foreign government". But it goes to show that if you want to nail mobile security, no one can be exempt. When setting a policy, you have to start at the top.

Countless examples of the loss or theft of laptops, mobile memory sticks and other storage devices from police, civil servants and even members of the military demonstrate how easy it is for both devices and data to go walkies, even from organisations you'd imagine would be very concerned with security.

And with technology and information becoming increasingly available on the move via a host of devices from smartphones to tablets to notebook PCs, these risks will only increase.

As a white paper from analysts TechTarget notes, IT managers know that effective mobile security solutions must be based around a combination of strong authentication, data encryption and secure transmission via Virtual Private networks.

But just as mobility has made technology more personal, so too does your security need to be ingrained in every individual of your organisation. And that starts at the top.

Tackling security means talking about it. A company's security culture can't be left to unwritten rules. You need to create clear, written rules - and stick to them.

The white paper tackles the thorny topics of information, network and device security one by one - and gives you step-by-step guidance on how to implement policies that stick.

Download the white paper from our sister site ITWhitePapers.co.uk now. Naturally, we get paid if you do.