Book Image

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Book Image

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Overview of this book

The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don't manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security is growing on a daily basis and this guide may just be the help you need. Mobile Security: How to Secure, Privatize, and Recover Your Devices will teach you how to recognize, protect against, and recover from hacking attempts and outline the clear and present threats to your online identity posed by the use of a mobile device. In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data's security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work.
Table of Contents (21 chapters)
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Tips to Help You Protect Your Mobile Device
The History of Social Networking, the Internet, and Smartphones
Index

About the Authors

Tim Speed is an IBM Senior Certified Systems Architect with IBM Software Services for Collaboration. In that capacity, he is responsible for designing, implementing, and supporting various engagements with IBM customers. Tim has been an IBM employee for over 18 years in a variety of networking, technical, hardware, and software support and consulting positions. He has been working with Lotus Notes for over 20 years, focusing on administration roles and infrastructure. He also has international experience with working on infrastructure engagements in Spain, The Bahamas, Japan, Hong Kong, Singapore, Malaysia, the UK, and Indonesia.

Darla Nykamp is an Internal Auditor with IBM, joining the company in 1996 after more than a decade in the IT industry. She has focused on software design and development, security policy design and implementation, business controls and compliance, and served as IBM's first Global Privacy Delivery Leader.

In her spare time, Darla earned a Doctorate of Law, a Master's degree in International Business Management, a Bachelor's degree in Computer Science, and certifications in security and privacy professions.

Mari Heiser is an IBM and Open Group Master Certified Architect with over 20 years of architecture, governance, risk, compliance, and technical management experience in networks and web technologies, specializing in security, compliance, and Service Oriented Architecture (SOA). Mari is also an expert in Identity and Access Management, Cloud, Security Analytics, and leads the IBM internal Information Security Community of Practice for the Americas. Mari's industry-specific experience has been concentrated in banking, manufacturing, distribution, bio-tech, education, and aerospace industries.

Joseph Anderson is an IBM Certified Managing Consultant from the IBM Collaboration Solutions Software Team. Joseph has worked with IBM Notes/Domino, IBM Connections, IBM Sametime, IBM WebSphere Portal, and IBM Quickr since the early 1990s, primarily as a consultant. He is currently responsible for managing complex Customer Engagements focusing on assisting customers with the development, licensing, and deployment of complex environments. Prior to working in the consulting industry, Joseph worked in the legal industry as a Director of Operations, where he leveraged his Master's of Science in Legal Administration from the University of Denver College of Law. Joseph is the co-author of two books: IBM Lotus Notes and Domino 8.5.3: Upgrader's Guide by Packt Publishing and Lotus Notes Domino 8: Upgrader's Guide by Packt Publishing. Additionally, Joseph was a Technical Reviewer for IBM Lotus Notes 8.5.3 How-to by Packt Publishing.

Jaya Nampalli is a Managing Consultant for IBM Software Services for Collaboration. She is responsible for the development of high quality solutions for IBM customers in response to specific business requirements. She is a technical lead developer working on solution feasibility studies or requirements analysis, application assessments, custom design, implementation, testing, and system integration. She works with clients to facilitate the execution of information strategies that are innovative and well aligned based on a client's business needs. At IBM, she considers working on the IBM Centennial project as one of the highlights of her career. Jaya has worked on both small- and large-scale projects. Jaya stays current with web technology advances and other IBM product offerings by self-education and collaborating with other IBM team members. Jaya has been an IBM employee for over 12 and half years.