Security Pros Identify Mobile Computing Security Challenges
Most companies now provide network access and application support for non-PC devices like smartphones and tablets and many are developing new applications and business processes designed specifically for these devices. Business managers look at iPhones, Android devices, and even Windows phones and see opportunities for revenue growth, cost cutting, and improved communication everywhere.
Okay so business folks are gaga over mobile, but ask any CISO about mobile computing and you’ll probably get a frustrated look in return. Security professionals know that mobile computing means securing thousands of various devices as well as the applications and content that resides on them. These mobile gizmos are often loaded with suspicious software for gaming, social networking, file synchronization/storage, etc. Furthermore, many are owned by employees, not employers, which means the security team needs to walk on eggshells as they protect the confidentiality, integrity, and availability of organizational assets. What a nightmare!
To read the complete article, CLICK HERE