Two recent reports show that neither users nor IT are particularly comfortable with BYOD as it stands today. And while IT is working to refine these policies, users are likely to ignore them.
When an employee links a personal account to a company iPhone, who is responsible for removing it when the user leaves the company? A court recently weighed in.
A California court has made a controversial ruling on BYOD programs that could leave companies struggling to cover a new, unforeseen cost.
There’s always been tension between users and IT when it comes to BYOD security. A new survey by Webroot shows where these two groups disagree and where they could find some common ground.
If you picture a mobile worker, the first thing that may come to mind is the executive firing off emails from a smartphone at an airport or a salesperson closing a deal from his car (hopefully while pulled over to the side of the road). But at the recent Consumerization of IT in the Enterprise […]
The lines between old-fashioned hacking attacks and the kinds of high-tech, complicated code-cracking you might see in a “Mission Impossible” movie are starting to blur. And it’s a good reminder of why users should be practicing some basic rules on protecting smartphones.
It’s been a busy year for IT pros. And next year isn’t shaping up to be much better.
Let’s face it: Users aren’t always the best at weighing risks. And that’s especially true when it comes to selecting the mobile apps they download onto their phones.
IT’s relationship with mobile technology is often told as a valiant battle to keep systems secure against mobile threats. But that’s not how IT pros would like things to be.