One of the best tools for making sure a lost or stolen phone doesn’t become a data breach nightmare is to wipe its memory. It also helps make sure that devices you’re done with don’t contain sensitive information.
Before we look ahead to next year’s challenges and promising developments, let’s take a look back at 2014’s biggest headlines.
Most users who agree to BYOD policies do it reluctantly because of two main hang-ups: They are afraid of having personal devices wiped if they’re lost or stolen, and they don’t want IT to be able to monitor what they do on their phones.
Most workers today want to be able to work from their own mobile devices at least some of the time, yet security will still present a major problem. So what’s keeping BYOD programs from being effective? In short, it’s the users themselves.
Two recent reports show that neither users nor IT are particularly comfortable with BYOD as it stands today. And while IT is working to refine these policies, users are likely to ignore them.
When an employee links a personal account to a company iPhone, who is responsible for removing it when the user leaves the company? A court recently weighed in.
A California court has made a controversial ruling on BYOD programs that could leave companies struggling to cover a new, unforeseen cost.
There’s always been tension between users and IT when it comes to BYOD security. A new survey by Webroot shows where these two groups disagree and where they could find some common ground.
If you picture a mobile worker, the first thing that may come to mind is the executive firing off emails from a smartphone at an airport or a salesperson closing a deal from his car (hopefully while pulled over to the side of the road). But at the recent Consumerization of IT in the Enterprise […]