Mobile computing is the use of devices that do not require a physical connection to process, transfer, or store data.
Examples of mobile devices include smartphones, laptops, USB storage devices, digital cameras, and other similar technologies.
The following are some of the controls to reduce the risks related to mobile computing:
- Use mobile device management (MDM) solutions.
- Store only data and applications on the device that are absolutely necessary for processing.
- Data stored on mobile devices should be backed up regularly to the organization's server.
- All mobile computing devices should be registered for tracking and monitoring control.
- Mobile devices that are stationed at a location should be physically locked.
- All mobile devices should be installed with anti-malware software.
- Use strong encryption mechanisms for data stored on mobile devices.
- Enable access control for mobile devices. Two-factor authentication can be used to further enhance security.
- Organizations...