IT Security
polices for notebooks and desktops are typically managed by restricting the
choices that users have by reducing the number options that are supported. This
standards-based process ensures control by reducing flexibility. But try
maintaining that system when users can buy a relatively cheap smartphone with as
much power as a desktop had in the early 1990s.


Furthermore, attempts by IT organizations to prevent the use of
handheld devices has largely failed because of the number of tools available to
work around IT policies. For example, users who are restricted from using
wireless e-mail often find ways to redirect e-mail to outside ISP services,
where they synchronize e-mail to their personally owned devices. This raises the
security threat for enterprises because it means that control of e-mail routing
has been losts.

Resources
Post Your Resume to 65+ Job Sites
Resume Service

Post to Twitter Tweet This Post