This article outlines the chief threats to smartphone and wireless devices, and the countermeasures individuals and enterprises can take to secure data transmission and protect important personal and corporate information.
More articles by Mark Komisky
Worker-owned PDAs and smartphones, while perhaps beneficial to staff productivity, introduce un-secure wild cards into otherwise secure environs; leaving companies open to data theft, regulatory compliance headaches, and other possible breaches of security.
Because today’s handhelds perform many of the same functions as a notebook computer, they pose similar vulnerabilities to themselves and the enterprise. Bluefire CEO Mark Komisky highlights e-mail in this first of a series of articles on mobile security.