While IT sweats BYOD policies, users reject them

Two recent reports show that neither users nor IT are particularly comfortable with BYOD as it stands today. And while IT is working to refine these policies, users are likely to ignore them. 

Lawsuit: Did company spy on former user’s iPhone?

When an employee links a personal account to a company iPhone, who is responsible for removing it when the user leaves the company? A court recently weighed in.

Court shifts BYOD responsibility: What it means for you

A California court has made a controversial ruling on BYOD programs that could leave companies struggling to cover a new, unforeseen cost. 

Users, IT clash on BYOD policies: 4 keys to fix it

There’s always been tension between users and IT when it comes to BYOD security. A new survey by Webroot shows where these two groups disagree and where they could find some common ground.

Mobile workers may not be who you think they are

If you picture a mobile worker, the first thing that may come to mind is the executive firing off emails from a smartphone at an airport or a salesperson closing a deal from his car (hopefully while pulled over to the side of the road). But at the recent Consumerization of IT in the Enterprise […]

10 keys for a BYOD policy that won’t get you sued

At first, BYOD was something a few brave companies were giving a shot. Then it became a nice way to get users off corporate devices. Now company phones are rare and BYOD is becoming the norm. What’s the next hurdle for Bring Your Own Device? Keeping it from becoming a legal liability. 

Pages: 1 2

Smartphone hack could bypass passcodes

The  lines between old-fashioned hacking attacks and the kinds of high-tech, complicated code-cracking you might see in a “Mission Impossible” movie are starting to blur. And it’s a good reminder of why users should be practicing some basic rules on protecting smartphones. 

The top 10 tech stories of 2013

It’s been a busy year for IT pros. And next year isn’t shaping up to be much better.

Permissions to destroy your phone?

Let’s face it: Users aren’t always the best at weighing risks. And that’s especially true when it comes to selecting the mobile apps they download onto their phones. 

3 things IT gets wrong with mobile technology

IT’s relationship with mobile technology is often told as a valiant battle to keep systems secure against mobile threats. But that’s not how IT pros would like things to be.