Emmanuel Ukpo
11/23/2014
Regis University
Copy write 2014
Abstract
Mobile devices dominate consumer use as such integrating them into the workplace is inevitable. “This surge in the use of mobile devices within a business enterprise potentially gives rise to various risks that need to be identified and effectively managed to avoid irreversible security and, ultimately, enterprise detriments” (ERM, 2014). While maximizing the business opportunities, in the process of integrating the systems, it is imperative to use best practices and effective security controls should be implemented in order to manage the enterprises’ risk (ERM, 2014). A recent paper issued by the Security for Business Innovation Council (SBIC) provides an analysis of the risks along with the recommendations and the valuable insights of nineteen security leaders from large global enterprises. For business to achieve operational partnership that is powered by information technologies great care must be taken to protecting information. As enterprises, face mounting regulatory pressures and escalating threats information security has become very important. Without the right security strategy, business innovation could easily be stifled or the organization put at great risk. In order to understand the risk factor, consider the factors that define the current mobile device (MD) use.
Note: This white paper does not comply fully with APA the requirements for writing a paper. The paper is intended as a working document for an organization.
Table of Content
Applicable Documents 4
Commonly used Acronyms 4
Mobile Device Management Change Initiative Plan (MDMCP 001) 6
Introduction 6
Scope 6
Benefits of the mobile enterprise 7
1) Lost or Stolen devices 8
2) Mobile Malware 8
3) Advanced Threats 8
4) Software Vulnerabilities 8
RSA Council Recommendations for Managing Risks of the Mobile Enterprise 12
a. Establish mobile governance. 12
Summary 13
References: ERM North Carolina State Poole College of Management. (2014, November). Managing Risks Of the Mobile Enterprise. Retrieved from http://erm.ncsu.edu/library/article/manage-risks-mobile-enterprise#.VGuBAmc8Tsk NIST Special Publication 800-128 (2011). Guide for Security-Focused Configuration Management of Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-128/sp800-128.pdf RSA (2014, November).The mobile security arsenal. Retrieved from http://www.emc.com/collateral/industry-overview/h11109-rsa-realizing-mobile-enterprise.pdf Tom M and Jennifer V. (2014, November, 21). Your apps are watching you - WSJ: The world street journal, pp. 01. Retried from http://online.wsj.com/