Thursday, December 25, 2014

How mobile users can manage security

The kill switch is here: iOS 8 enables it by default

Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone

InfoWorld's Security Central
December 25, 2014

Mobile users favor productivity over security -- as they should

If you force employees to choose between productivity and security, you deserve the inevitable result: a security problem at some point or a productivity problem. And if you force employees to choose between productivity and security, you're the problem that needs to be fixed.

READ MORE
 

Issue highlights

1. The kill switch is here: iOS 8 enables it by default

2. INSIDER Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone

3. INSIDER 5 steps to more mobile-security-savvy employees

White Paper: Protiviti

2014 IT Security & Privacy Survey Results

With the recent plethora of cyber-attacks and data breaches, prevailing wisdom suggests companies are working diligently to "get their houses in order." But findings from Protiviti's latest IT Security and Privacy Survey suggest otherwise. View now

The kill switch is here: iOS 8 enables it by default

Apple has become the first smartphone maker to enable by default a kill switch that can lock and secure a stolen phone. Smartphones are attractive targets for thieves, and law enforcement officials hope the kill switch will change that. READ MORE

INSIDER

Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone

iOS 8 and Windows Phone 8.1 both up the ante for mobile management, but iOS 8 also raises questions beyond MDM tools' capabilities. READ MORE

INSIDER

5 steps to more mobile-security-savvy employees

It takes more than policies and penalties to make your workers smart about mobile security. Here's how to identify and correct problem behaviors in your organization that can leave your corporate data vulnerable. READ MORE

White Paper: RSA Security, Inc.

Taking Control of the Mobile User Authentication Challenge

Traditional password strategies aren't keeping pace with the evolving landscape, where identity is increasingly a critical threat vector. This asset examines the growing demands on authentication systems and the issues IT is struggling with to protect digital assets and retain control, while achieving the desired user experience. Learn More

DAILY NEWS, DELIVERED TO YOUR INBOX FIRST THING

Start your workday with Today's Headlines: First Look, and find out what the tech world will be talking about all day.
Subscribe now!

Follow InfoWorld

You are currently subscribed to infoworld_sec_rpt as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

Copyright (C) 2014 InfoWorld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@infoworld.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:59 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive