Smartphone Security Gaps Exposed

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10
Previous Next

Click through for smartphone security gaps and tips on how to patch them.

Also see: Smartphones that Work for Business

As the number of smartphones capable of accessing enterprise resources increases, it’s important to remember that smartphones operate more like a computer than a phone.  Smartphones work so well as a portable office because they have the capability to browse the Internet.  That capability means your employees are at risk for viruses and other security breaches, so IT staff need to be just as vigilant with company-issued phones accessing the network as they are with computers.

We’ve put together this list of vulnerabilities inherent in the current generation of mobile devices, and then outlined the elements necessary to patch those security gaps.

The IT Business Edge Knowledge Network also provides several resources for establishing guidelines for mobile device use within the enterprise.


More Slideshows:

Five Ways to Protect Your Organization Against Social Engineering
Reduce your risk of a socially engineered attack through strictly enforced policies and procedures, training, and testing.


Smartphones that Work for Business

Not surprisingly, Research in Motion was the big winner of our informal poll of analysts. All but one of the analysts chose at least one BlackBerry device.


11 Work-Related iPad Apps Worth a Look

The sexy Apple tablet already has a growing fleet of business software on the market.



 

Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

 
More Slideshows

Mays2015WearableTech0x 2015 Wearable Tech Trends: Swank Meets Science

Tech companies and fashion designers both seem to agree that the wearables of tomorrow will likely be fashion that incorporates technology instead of the other way around. ...  More >>

Bluebox2015MobileSecurity190 Mobile Security 2015: The Enterprise at Risk

While hackers have many points of entry – point-of-sale devices, phishing emails, malware, etc. - the long reach of mobile to mission-critical apps and data has exponentially increased the potential for a breach. ...  More >>

Android2014BestApps0x The Eighteen Best Android Apps of 2014

With the end of the year fast approaching, the staff at Google Play has made their picks for the best Android apps of 2014. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date