The lines between old-fashioned hacking attacks and the kinds of high-tech, complicated code-cracking you might see in a “Mission Impossible” movie are starting to blur. And it’s a good reminder of why users should be practicing some basic rules on protecting smartphones.
IT is understandably focused on beefing up technical security to protect against hackers and other online threats. But there”s another danger out there many businesses are failing to guard against:
IT puts a lot of effort into securing networks, servers, and users’ computers. But what about the bigger picture? Taking a look at physical security and focusing on different protective measures can help an organization cover all of its bases.
Allowing users to carry sensitive data on a portable computing device creates a certain amount of risk. But here’s a data breach that occurred because several pieces of IT equipment were stolen from an employee’s car.