6. Benefits and Risks
• Lack of employee awareness
• Insecure browsing and downloading
• Insecure connection
• Multiple uses
• Lost or stolen devices
7. Addressing Risks
• Overall plan to address risks
o Mobile Device Management
o Security features
o New technology
• Raise employee awareness regarding
mobile security policies
8. Addressing Risks
• Management of lost or stolen devices and
downloads
o Remote control
o Management of downloading
• Segregation of personal and company
data
• Requirements on security applications
9. Impact on CA Profession
• 10 steps of audit procedures to
auditing mobile computing security
10. Impact on CA Profession
• Reliance on Internal Controls
o COSO
oRisk assessment
oControl activities
o ISACA Mobile Computing Security
Audit/Assurance Program
11. Conclusion
• Evolution of Mobile Devices
• Benefits and Risks
• Ways to Address Risks
• Impact on CA Profession