Avotus Corp
info@avotus.com info@avotus.com   1-877-AVOTUS-1 1-877-AVOTUS-1  
 
English
English
French
Français
Accueil »Resources»Blogue

 

Blogs

Latest Android Malware Highlights the Case Against Bring Your Own Devices to Work

With news of security threats to smartphones growing, does a Bring Your Own Device to Work (BYOD) policy still make sense? The Android operating system’s popularity among consumers has also made it an attractive target for cyber criminals. It makes it likely that a BYOD policy with no restrictions will lead employees to bring Android devices and malware with security risks to work.

The most recent example of attacks on Google’s mobile operating system includes a spammer who has control of a botnet that spreads through Android devices. This botnet enables hackers to take control of victims’ smartphones and use their e-mail accounts to send spam. While individuals may be able to simply apologize for any spam that comes from their e-mail accounts, businesses are held to a higher standard. In many cases, they can be assessed for damages and other penalties for failing to take adequate security precautions. In addition, bad publicity over security breaches may lead customers to worry about doing business with a firm that fails to protect its customers.

These examples highlight important differences in the expectations that people have for the types of security that businesses will have compared to consumers. These differences are relevant for your evaluation of a BYOD policy. It is important to remember that smartphones provide employees with access to corporate assets beyond voice services and e-mail. It may corporate software, intellectual property, financial records, customer data and other items.

Finding the right mix of mobility services for your organization will depend on the types of information and other corporate intellectual property that resides on employees’ smartphones through e-mail, attachments, and other technology. In addition, employees that work away from the office and those that have mission critical roles should have secure devices that are managed by employers. The foundation of any program is a formal policy that establishes the right mix for some BYOD devices and corporate managed devices.

Avotus Mobile Communication Lifecycle Management (MCLM) can help you manage corporate devices with a comprehensive approach and complete visibility into your corporate wireless environment and usage for those mobile devices. Learn how it will ensure that corporate policies are proactively enforced.

 
Tagged: smartphone security, Bring Your Own Device to Work, BYOD, Android operating system, Avotus Mobile Communication Lifecycle Management, MCLM
 
 
LEAVE A REPLY
Name * :
Company * :
E-mail Address * :
Comments * :
Type the below code : :
: The CAPTCHA image
  :
 

 

 

Solutions
Gestion des dépenses
Rapports d'utilisation
Intelli-Approvisionnement
Gestion du sans-fil
Ressources
Blogues
Brochures
Clients gagnants
Livres blancs
Actualités et événements
Événements
Communiqués de presse
Mentions médiatiques
Entrevues vidéos
Soutien
Soutien en ligne
Formation sur demande
Taux et tarifs
À propos d 'Avotus
La direction
Conseil d'administration
Lauréats
Association industrielle
Les partenaires
Nos clients
Carrières
Contactez-nous
Google+
Twitter
Linkedin
Plan du site | Termes d'utilisation | Déclaration de confidentialité Copyright © 2016 Avotus Corporation