Smart phones, their operating systems and security characteristics
have rapidly evolved as has the reliance upon them by
organizations to conduct business. The unusual mix of personal
and business use for smart phones as well as their unique
combination of capabilities creates a number of challenges to
managing their risk. This paper explores the types and nature of
threats to the organization from the use of smart phones along
with controls, available security software and tools. The current
state of corporate smart phone security programs and policies is
examined. Smart phone securitypolicy considerations are
discussed and recommendations are made for building a smart
phone security program.