Mobile security is a complex issue that is growing more difficult as devices multiply within the organization. New devices include new ecosystems and new operating systems, which can conflict with existing security measures as well as adding less understood modes of access to online data. Lack of familiarity creates innumerable vulnerability points that may be exploited by sophisticated hackers, as devices become more widely used in critical applications. We have looked at mobile security before, mainly around the proliferation of smartphones in the office. But the issue is likely to become much more complicated as we enter the era of the Internet of Things (IoT).
Not a member? Gain Access to the Cutter Experts today — register now to read select open-access articles.
Member/Guest loginForgot your password?