A deep dive into the techniques in the mobile framework
We live in a connected world and it’s rare to see a person without at least one mobile device. In our pockets, we have access to a ton of financial and personal information, not to mention that most of us also have access to our corporate networks. It’s also a known factor that end users are considered one of the weakest links in an organization’s security posture. That said, we understand that you can only recommend instead of apply security controls to end users with their personal phones, but you can protect your organization-owned mobile devices. One good thing about mobile devices is that there really are only iOS- and Android-based devices, so you don’t have to factor in a ton of variations, just the base OSes and then the additional producers. In this section, we’ll take a look at the overarching mobile matrix, the Android matrix, and the iOS matrix and pick out a few techniques to review...