What behaviors determine the security risk mobile devices pose?
In recent news, Hillary Clinton may have inadvertently become the poster child for Shadow IT. Unfortunately, she's not the first and likely won't be the last person to subvert IT policies.
Whether it's a rooted or jailbroken device, staff accessing open / public Wi-Fi networks with their corporate devices or employees sharing proprietary content via public email servers - people will always find a way to circumvent IT policies that don't suit their need for convenience. Don't kid your self though, those aren't the only risks to data and corporate network health.
Inquiring minds want to know...
We're running a survey and are really interested to hear from IT pros first hand!
What are your concerns regarding mobile security?
Take the Survey
... and you could win a Silent Circle Blackphone!
We'll be publishing the results in a future blog post. Stay tuned!