Today's IT departments are finding new ways to safeguard the behaviors of their mobile work force.
Click through for seven security habits of highly effective mobile admins, as identified by Good Technology, Inc.
Click through for seven security habits of highly effective mobile admins, as identified by Good Technology, Inc.
Click through for seven security habits of highly effective mobile admins, as identified by Good Technology, Inc.
Let's face it: IT administrators in America's top corporations have their hands full protecting company information in a world gone mobile. Smartphones, and the smart employees who use them, can often circumvent security procedures, forwarding confidential memos or attachments to other phones or alternate email accounts without consideration for the vulnerability of that information.
Rather than limit access to information, today's IT departments are finding new ways to safeguard the behaviors of their mobile work force — regardless of the devices they choose — and prevent data loss or leakage across their networks. Here are seven habits Good Technology, Inc. has identified for how they do it.
Password Misuse Could be the Root Cause of Hacking SpikePassword chaos amongst IT staff and apathy about password security amongst their senior management is creating a security nightmare.
The Six Dumbest Hacks of All Time While hackers can be dangerous, not every hacker is a Kevin Mitnick.
Seven Tips to Protect Your Google WalletEven with Google Wallet's built-in identity theft protections, you still need to be wary of hackers.
An eWEEK Property
Copyright 2021 TechnologyAdvice All Rights Reserved.
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.