As the number of smartphones capable of accessing enterprise resources increases, it’s important to remember that smartphones operate more like a computer than a phone. Smartphones work so well as a portable office because they have the capability to browse the Internet. That capability means your employees are at risk for viruses and other security breaches, so IT staff need to be just as vigilant with company-issued phones accessing the network as they are with computers.
We’ve put together this list of vulnerabilities inherent in the current generation of mobile devices, and then outlined the elements necessary to patch those security gaps.
The IT Business Edge Knowledge Network also provides several resources for establishing guidelines for mobile device use within the enterprise.
Five Ways to Protect Your Organization Against Social Engineering
Reduce your risk of a socially engineered attack through strictly enforced policies and procedures, training, and testing.
Smartphones that Work for Business
Not surprisingly, Research in Motion was the big winner of our informal poll of analysts. All but one of the analysts chose at least one BlackBerry device.
11 Work-Related iPad Apps Worth a Look
The sexy Apple tablet already has a growing fleet of business software on the market.
Five ways field service personnel can gain instant credibility (and brand equity for their firms) in the eyes of customers through the use of cloud-based, mobile personal assistants on their smartphones. ... More >>
Tired of missing deadlines, losing notes, or running late for meetings? It's time to put the power of mobile to work for you, especially for your peace of mind. ... More >>
While it may seem the kids are loading up on the cool toys, never fear. Many of these gadgets and gizmos are equally fun and intriguing for the adults. ... More >>