"Treat all smartphones as uncontrolled endpoints. Smartphone users' identities can be stolen, hacked or inappropriately shared. Smartphones can get lost, stolen or borrowed. Device identification technology uses serial number information to allow organizations to associate a specific smartphone to a specific user. This provides a watermark for the device, and allows IT to remotely disable it and erase all sensitive data." ~Patrick Sweeney
http://www.technewsworld.com/story/10-Best-IT-Practices-for-Smartphone-Security-70826.html
How many of you have a smart phone? How many of you have them secured? In a few of my classes we have actually seen how secure they come out of the box, which is basically not at all. You have to enable your security in most cases. This is just some info on how you can be more secure.
No comments:
Post a Comment