Technology, security, analytics and innovation in the world of audit and business.
Tuesday, February 26, 2008
The Good and Bad of Tagalong Technology
Various mobile "consumer" devices, like Blackberries and iPhones can connect with and synch with corporate networks, creating essentially unauthorized networks. The result can be a sharp decline in security. Some companies, however, are taking the step of limiting the devices that their personnel are allowed to connect to the network. We'll see more of this until the makers of the consumer devices incorporate appropriate security features to make them safer as corporate network expensions. The Good and Bad of Tagalong Technology
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment