PacktLib: Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Credits

Foreword

About the Authors

About the Reviewers

www.PacktPub.com

Preface

Living in a Mobile World

The dangers of mobile computers

Precursors to the smartphone revolution – Internet, social-networking, and spam

The new mobile world

Mobile purchasing and identification methods – who needs credit cards?

The cloud

Summary

Users and Mobile Device Management

Protecting the corporations

Mobile and business

Buying your device

Mobile Device Management

Acceptable use policy (AUP)

Summary

Privacy – Small Word, Big Consequences

Troy and You

Data good enough to steal

Good idea, mixed results

And that's only the first part…

Who has your data? Round 1…

Who has your data? Round 2…

Who has your data? Round 3…

Who has your data? The final stretch…

Your data in their hands

Will your money be "too" mobile?

Bring your mobile device to work day

Steps you can take to protect yourself

Summary

Mobile and Social – the Threats You Should Know About

A prediction of the future (and the lottery numbers for next week) scams

Social engineering

Virus/worms/others

Future threats

Steps you can take to protect yourself

Summing it up

Summary

Protecting Your Mobile Devices

Identifying your phone – the numbers that set your device apart

Preventative measures – how to reduce the likelihood that your device will be hacked

In the event that your device has been compromised

Summing up

Summary

Support and Warranty Insurance

Toby's story

The smartphone – a personal device, a company device, or both?

The wide world of customer service and technical support

OS operators, manufacturers, and service providers

How to get the most out of your technical support experience if you have a malfunction

Warranties in the mobile space

Warranties

In a nutshell

Summary

Baby Boomers, Teens, and Tweens

The boom in baby boomers

Colliding generations

Speaking of the younger generation…

Summary

Getting Your Life Back After You've Been Hacked

Device profiles

Have you been hacked?

In the event of a hack

Summing it up

Summary

IBM Notes Traveler

IBM Notes Traveler

IBM Notes Traveler

IBM Notes Traveler

Mobile Device Management

Mobile Device Management

Mobile Device Management

Mobile Device Management

Tips to Help You Protect Your Mobile Device

Mobile Acceptable Use Policy Template

Mobile Acceptable Use Policy Template

Mobile Acceptable Use Policy Template

The History of Social Networking, the Internet, and Smartphones

The History of Social Networking, the Internet, and Smartphones

Index