Ten Security Tips for Personally Managed iPhones and iPads - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Ten Security Tips for Personally Managed iPhones and iPads-4 Next

"Jailbreaking" is the term that refers to the process of modifying the iOS device's operating system in violation of the end-user license agreement. Jailbreaking significantly damages the device's ability to resist attacks because it disables the enforcement of code signatures, which is an important security feature. Jailbreaking an iPhone or iPad makes the attacker's job substantially easier. Most publicly released attacks targeted at iOS devices require that they first be jailbroken.

Another concern related to jailbreaking is the quality of the tools and applications provided by the jailbreaking community. These free applications are developed with little oversight and limited testing. They may include viruses or other malware, and they may inflict lasting harm on your device by breaking it permanently or corrupting your data.

Smartphones, tablets and other mobile computing devices are becoming our go-to devices when it comes to getting things done, especially outside of the traditional office setting. They're just too convenient, and the increasing power packed into these gadgets means that some of them are worthy (or nearly worthy) of supplanting the laptops and desktops they once supplemented.

However, the smaller form factor of these devices, the "nomadic" nature in which they are used and the proliferation of different strategies (or inadequate ones) for securing these devices means that they create their own kinds of risks to your business data.

Given the risks, it’s important to adhere to strong security practices, especially if your device is personally managed and not administered by your company’s IT department. This slideshow features recommendations from The Information Assurance Mission at the NSA for securing your personally managed iPhone or iPad.

More Slideshows:


Don't Be a Loser: Think Before You Post It doesn't look like online users have learned much, as the number of those with "poster's remorse" has increased since last year.

Eleven Easy Ways to Improve Your Survey Response Rates Tips for getting better results when conducting surveys.


Nine Female Executives to Watch Top female executives to keep your eye on.

 

 

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.