Securing Mobile Devices: Make it Easy or Pay the Price
|
December 9, 2015

To BYOD or Not BYOD?
BYOD, or Bring Your Own Device, is a common business practice where employees can use their own personal devices for work purposes. This can lower costs, but also brings up a number of support and security related challenges. With BYOD, companies still need to control the delivery of business applications and access to critical information. There are a lot of tools available for security and managing employee-owned devices, and it is critical companies research and invest in the one that is right for them.
Password, Password, Password
One of the most common vulnerabilities is a weak password. Recently, a dump containing user data such as usernames, e-mail addresses, password hashes, and password hints for millions of Adobe customers was leaked online. Considering that many people use the same password for multiple programs, it is likely that tens of millions of user accounts were compromised. When managing mobile device passwords, it is important to educate employees on proper password creation. Remember, passwords are like underwear; change them often, keep them private and never share them with anyone.