Security Tips to Combat Mobile Device Threats to Health Care - Slide 4

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15
Next Security Tips to Combat Mobile Device Threats to Health Care-4 Next

Brick the mobile device when it is lost or stolen.
– Jon A. Neiditz, partner, Nelson Mullins Riley & Scarborough LLP

In the last year, ID Experts has seen greater acceptability among employees of "remote wipe" processes that "brick" the entire device when it is lost or stolen, rather than just wiping the encrypted silo of corporate information, for example. The reason that bricking the entire device is more acceptable, in their view, is that personal data is now more frequently backed up in cloud storage, so the bricking of the entire device does not result in data loss, and protects the employee as well as the company. This is the first tip in the context of BYOD programs.


Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

More Slideshows

Wearables How Wearable Devices Are Creating Innovation in the Workplace

Wearables are revolutionizing the workplace, with innovations that create a safer work environment or enhance the way professionals are able to go about their job. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.