Does your organization allow employees to access company resources such as email or other applications via mobile devices? If so, then you owe it to your employer to learn how to secure these devices and, more importantly, the corporate assets they access.
Last week we pointed you to a really good report, "A Window into Mobile Device Security," from Carey Nachenberg, VP and fellow at Symantec Corporation. Nachenberg describes the native security capabilities of two of the top mobile operating systems: iOS from Apple and Google's Android. The Symantec report looks at how these OSs compare with regards to five pillars of security: traditional access control, application provenance, encryption, isolation, and permission-based access control.