Staff are increasingly using their personal devices for work. Productivity may increase as a result, but the trend brings with it security risks, as corporate data leaves enterprise servers via unsecure public WiFi, and resides in easily lost or stolen devices.
Stuart Sumner, deputy editor, Computing, talks to end-users and security experts to find out how best to manage the risk.
There is a lot of attention being paid to how business leaders can use the mobile computing preferences of employees and customers to be more responsive, efficient and successful. This white paper runs through five security considerations for the mobile age.
This Dummies white paper will help you better understand business process management (BPM)