answer below question 48
Mobile apps rely on the browser to operate, and as a result, the occurrence of web-based attacks on mobile devices is on the increase. Firewalls alone are no longer enough. With the rise of BYOD, companies must include mobile devices as part of their security policies. Your activity this week is two-fold: First, discuss five threats to mobile security. Second, discuss best practices for securing mobile devices within an organization.
Your paper should be 3-4 pages in length and conform to CSU-Global Guide to Writing and APA (Links to an external site.). Include at least three scholarly references in addition to the course textbook. The CSU-Global Library is a good place to find these references.