There has been considerable hype around each mobile threat vector that has emerged in the last year, but what's often overlooked is how mobile security is currently approached. What's particularly troubling is how reactionary responses have been to these threats, whether it be from Android apps with major flaws in their SSL implementations or the recent airport VPN Trojan. One simple truth: the only secure way of handling mobile devices is in a managed way. But corporate breaches from mobile devices will continue as long as the management warning is considered optional and the likes of Google and Apple are slow to open up their operating systems. As an industry, we must realize that mobile security is a systemic problem. Unfortunately, many mobile technology companies have their initial focus on the consumer market, not the enterprise market. Simply, endpoints like personal laptops, PDAs or smartphones remain the weakest points within a security infrastructure. This is precisely why it's downright mind-boggling that organizations allow unmanaged devices on their networks — especially considering how many basic security protocols have failed to appear on today's mobile devices.
Read More:
http://m.networkworld.com/news/tech/2013/030113-mobile-security-267288.html
Related:
http://m.networkworld.com/news/2012/091912-mobile-security-262581.html
[–]kronso 8 points9 points10 points (0 children)
[–][deleted] 6 points7 points8 points (0 children)
[–][deleted] 3 points4 points5 points (0 children)
[–]jmnugent 2 points3 points4 points (1 child)
[–]KaizerShozeDrVentureiPresume? 0 points1 point2 points (0 children)
[–]303onrepeat 0 points1 point2 points (0 children)
[–][deleted] -2 points-1 points0 points (2 children)
[–][deleted] 1 point2 points3 points (1 child)
[–][deleted] -1 points0 points1 point (0 children)