Bring-your-own device (BYOD) sounds like a great idea to improve productivity, but the challenges it poses from a security and IT management perspective continue to trouble organizations large and small.
A group of researchers from Northwestern University and North Carolina State University tested ten of the most popular AV products on Android, and discovered that they were fooled by common obfuscation techniques.
Infonetics Research estimates that over the next 5 years, more than 7 billion new smartphones and tablets will ship worldwide, resulting in increased sales of mobile device security client software to top $2.9 billion by 2017.
The ACLU has filed an FTC complaint against AT&T, Sprint, T-Mobile, and Verizon Wireless,because they leave customers exposed to harm by not updating their handset operating systems in a timely manner.
There is no way to deal with the risk that BYOD brings. Between Android and iOS, there are millions of apps readily available for download, countless numbers of which open up doors in BYOD technologies that hackers and cybercriminals can easily stroll through.
The challenge is how to give users the full advantage of their mobility platform of choice without introducing risks to the business. A key part of that challenge is enabling flexible mobile security options depending on the device and use case
From a security perspective, most consumer devices and services leave much to be desired. The tools at the disposal of security professionals for dealing with consumerization are quite limited and include the ability to Block it, Wrap it, or Allow it and pray.
If regulatory protected information gets onto your device, you are obligated to protect it. Are you fully prepared to guarantee that everything you are doing on your personally managed device meets the obligations of you and your organization to protect sensitive information?