Access your Pro+ Content below.
What are the biggest mobile device security threats?
This article is part of the Access issue of October 2017, Vol. 1, No. 7
With the rise of mobile devices in business, IT departments also need to reassess the risks involved. Mobile device security threats are evolving, with new hazards apparent every day and new measures IT must take to address them. Four IT professionals offer their insight about the biggest mobile device security threats today. Tim Riegler systems engineering manager, Cherry Health The biggest mobile security risk we have today is rooted devices: iPhones, Android phones. Once you do that, there is no guarantee of a secure ecosystem, specifically around Apple devices. But even with the stuff like Samsung Knox, once you root [the device], then you can get around the Knox stuff. Now you are looking at a personal device used for corporate, or a corporate-owned device, that is [not secure]. Kevin Beaver information security consultant, Principle Logic Kevin Beaver Shadow IT is creating problems. IT and security are basically out of the loop, and unfortunately users are making their own decisions. You need to set users' expectations ...
Access this PRO+ Content for Free!
Features in this issue
Providing remote customer support can be a challenge for organizations of any size. But there's an app for that -- which one software provider put to good use.
When it comes to user experience monitoring for VDI, IT has a choice between an agent-based or a virtual user-based approach. Each one has its pros and cons.
Get to know the Lenovo ThinkPad X270, including its optional processor choices, the ThinkPad pointing stick and its extended battery life.
As long as there are mobile devices, there will always be security risks for organizations to face. Four IT professionals share what they think the worst issues are today.
News in this issue
Tiny is trending, whether it comes to houses or mobile app development. Many organizations are trying customizable, single-purpose micro apps on for size.
Columns in this issue
Users work with a host of different devices these days, and IT must manage them all. Unified workspaces can help, but they can introduce some complexity as well.
Mobile initiatives are bound to fail if organizations don't look before they leap. Defining a business strategy is a crucial step in the app development and deployment process.