Mobile security is a complex issue that is growing more difficult as devices multiply within the organization. New devices include new ecosystems and new operating systems, which can conflict with existing security measures as well as adding less understood modes of access to online data. Lack of familiarity creates innumerable vulnerability points that may be exploited by sophisticated hackers, as devices become more widely used in critical applications. We have looked at mobile security before, mainly around the proliferation of smartphones in the office. But the issue is likely to become much more complicated as we enter the era of the Internet of Things (IoT).
Advisor
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.