Friday, September 17, 2010

Tech News World : 10 Best IT Practices for Smartphone Security

"Treat all smartphones as uncontrolled endpoints. Smartphone users' identities can be stolen, hacked or inappropriately shared. Smartphones can get lost, stolen or borrowed. Device identification technology uses serial number information to allow organizations to associate a specific smartphone to a specific user. This provides a watermark for the device, and allows IT to remotely disable it and erase all sensitive data." ~Patrick Sweeney

http://www.technewsworld.com/story/10-Best-IT-Practices-for-Smartphone-Security-70826.html

How many of you have a smart phone? How many of you have them secured? In a few of my classes we have actually seen how secure they come out of the box, which is basically not at all. You have to enable your security in most cases. This is just some info on how you can be more secure.

No comments:

Post a Comment