Follow on Google News News By Tag Industry News News By Location Country(s) Industry News
Follow on Google News | Mobile Phone Security and TrendsAn example is simply the misuse of apps using cloud services on mobile devices; tablets and smartphones. For malware to do any significant damage anywhere for example, it would have to be at an administrative level. Jailbreaking an Apple iPhone or rooting an Android smartphone would become the most obvious devices to become compromised in this way. This is because it can escalate the mobile user’s privileges significantly on any of those mobile phones thus turning the user into an administrator. The best defense against such scenarios is simply implementing a mobile device management policy especially in Bring Your Own Device (http://ting.7eer.net/ A recent survey by Gartner sheds more light on BYOD security. Many BYOD users use their mobile devices in a mix of social task and productivity in a 2013 fourth quarter survey of 995 American workers conducted by Garter. This can increase the threat that cyber attacks on such devices can result in loss of data, breach of security and also compliance violations under a company’s management policy. Creating a lax and false sense of security can unfortunately easily do damage to any company. Gartner says that roughly 25% of respondents said last year they had experienced a security related issue with their smartphone. Alarmingly only 27% of those considered it serious enough to report to their employer. According to Juniper Research, payments made via a smartphone totaled more than 110 million transactions. That number should triple by 2017. Europe also has a growing presence of terminals accepting these “contactless payments”. Mobile banking technology is available worldwide largely due to developing countries according to Juniper Research. In their recent report, 800 million mobile phone users (http://ting.7eer.net/ This ads to the importance of security on smartphones as well as other non-mobile devices and computers or servers. Many CIO’s and IT directors are struggling with how to tackle the issue of enforcing and making it very clear to employees of established company policies and that all employees are compliant with those policies at all times. More information here: http://www.hostinganddesigns.com/ End
Account Email Address Account Phone Number Disclaimer Report Abuse
|
|