Mobile Security: Myths Vs. Reality

Mobile Security: Myths Vs. Reality

Mobile Security: Myths Vs. Reality

Myth #1: Company-issued devices are the only way to ensure mobile security.
Personal devices can be used safely. By separating corporate and personal apps in different containers, you can build a protective barrier between the two.

Mobility has rapidly moved into the mainstream of the enterprise and changed IT and business processes in profound ways. Today, it's next to impossible to find an organization that doesn't incorporate at least some mobile devices—smartphones, tablets and laptops—into the fabric of the business. In fact, according to various industry statistics, somewhere in the neighborhood of 90 percent of companies have adopted some form of bring your own device (BYOD). Yet, despite rapid adoption and a growing focus on mobility, many business and IT executives cling to myths and misconceptions. In many cases, organizations are adopting strategies and security protections that aren't in the best interests of the organization, points out Bill Conner, CEO of security firm Entrust. He believes that it's critical to understand the current state of mobility and to build a strategy and protections around actual risks. To clarify things, Entrust has provided the following common myths about mobile security, along with a fact-based explanation of the true situation.

Samuel Greengard is a freelance writer for Baseline.
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.