How iOS Defies Traditional Security

Tuesday Sep 6th 2011 by Robert McGarvey
Share:

Whether it’s the iPad or the iPhone, Apple's mobile devices defy traditional network security tactics.

Are your employees clamoring to use their iPads and iPhones at work? Or, a more likely scenario, are your employees simply using their iOS devices to access your company's network, sanctioned or not?

If you have concerns about iOS security, you might want to take a page from the enterprise. While they are bigger and have more resources, they've been dealing with the non-traditional nature of iOS security for some time, so why not learn from them?

This article from our colleagues at eSecurityPlanet discusses some of the challenges to locking down an iOS device in the workplace.


The problem for security professionals staring at a relentless onslaught of iOS devices (iPhones and iPads) that want entree to the corporate network is this: you cannot do much at all to secure those devices. It's out of your hands. When it comes to iOS devices, it is In-Cupertino you must trust.

Read the complete article: The iOS, iPad, iPhone ... iEverything Security Conundrum

 

Small Business Computing is on Facebook. Join us on Facebook and interact with the site's editors, post messages, share your small business challenges and successes, discuss technology and suggest topics you'd like covered on Small Business Computing.

Do you have a comment or question about this article or other small business topics in general? Speak out in the SmallBusinessComputing.com Forums. Join the discussion today!
Share:
Home
Mobile Site | Full Site
Copyright 2017 © QuinStreet Inc. All Rights Reserved