Bytesize 2008

Lock Before You Load

HARDWARE Mobile Devices SECURITY As with laptops, mobility comes with a price.

18 June 2009

HARDWARE Mobile Devices

SECURITY As with laptops, mobility comes with a price. Among the biggest of these is the potential for security breaches that smartphones and devices can bring to the table. The biggest mistake you can make is to treat your device like just another phone with some funky bells and whistles; it’s not. You’ve got to start thinking about them in the same way as you do your workstations or laptops, meaning that you’ll need to exercise some degree of control over how they’re used in your workplace. Today’s devices run sophisticated software that, far from being completely embedded to the phone-specific architecture of the past, offers the kind of flexibility that end users may not be aware of, but crackers are.

ITWeb Premium

Get 3 months of unlimited access
No credit card. No obligation.

Already a subscriber Log in