Making sense of mobile device, app, and information management

Posted by:IT Trainer Posted on:Mar 1,2012

Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful — and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information, but the variety of platforms, the fact many are employee-owned, and uneven security capabilities all add up to a real — sometimes impossible — challenge to manage them in the same way as the corporate PC.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

The issue is not so much hacking; outside of malware easily available in the Android Market, mobile devices are safer than PCs from hackers. Instead, the issue is inappropriate information usage, where employees inadvertently spill the beans about contacts, embarrass people, violate any number of privacy regulations, and neglect compliance obligations. Most people do it by mistake, while some people do it deliberately; what matters is that they do it.

That puts organizations in an uncomfortable position. Survey after survey shows that technologically empowered users are happier and more productive, so businesses want to tap into that benefit. But they also have to safeguard their secrets and comply with regulations. The good news is that although the methods and tools are still new, there are known, proven approaches to reducing those risks without disabling the benefit of consumerization.

Click to rate this post!
[Total: 0 Average: 0]

IT Trainer

No description.Please update your profile.