A California court has made a controversial ruling on BYOD programs that could leave companies struggling to cover a new, unforeseen cost.
There’s always been tension between users and IT when it comes to BYOD security. A new survey by Webroot shows where these two groups disagree and where they could find some common ground.
If you picture a mobile worker, the first thing that may come to mind is the executive firing off emails from a smartphone at an airport or a salesperson closing a deal from his car (hopefully while pulled over to the side of the road). But at the recent Consumerization of IT in the Enterprise […]
The lines between old-fashioned hacking attacks and the kinds of high-tech, complicated code-cracking you might see in a “Mission Impossible” movie are starting to blur. And it’s a good reminder of why users should be practicing some basic rules on protecting smartphones.
It’s been a busy year for IT pros. And next year isn’t shaping up to be much better.
Let’s face it: Users aren’t always the best at weighing risks. And that’s especially true when it comes to selecting the mobile apps they download onto their phones.
IT’s relationship with mobile technology is often told as a valiant battle to keep systems secure against mobile threats. But that’s not how IT pros would like things to be.
A recent survey has some news that likely won’t be a shock to most technology pros: Younger employees typically have no qualms about breaking IT policies that they don’t agree with. But there was another finding that could give IT managers some hope.
It’s no secret that users like to ignore IT policies. In a lot of cases it’s because the rules get in the way of how people work most effectively. But other times, it’s because users don’t know what the rules are.