Your Guide to Authenticating Mobile Devices

New information technology (IT) mobile devices—such as the iPhone and iPad—are increasingly emerging in the consumer market first. Then, they spread to the workplace. But this is creating major privacy and security headaches for corporate executives. Surveys show that IT groups significantly underes...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:The Journal of Corporate Accounting & Finance 2013-07, Vol.24 (5), p.51-68
Hauptverfasser: Mooney, J. Lowell, Parham, Abbie Gail, Cairney, Timothy D.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:New information technology (IT) mobile devices—such as the iPhone and iPad—are increasingly emerging in the consumer market first. Then, they spread to the workplace. But this is creating major privacy and security headaches for corporate executives. Surveys show that IT groups significantly underestimate—by as much as 50%—how many employees use their own mobile devices for work purposes. So what is to be done? The authors take an in‐depth look at one vitally important security measure: user authentication. Companies need to go beyond just using passwords if they want to stay safe and secure. This article shows you how. It includes step‐by‐step instructions and a series of valuable checklists. © 2013 Wiley Periodicals, Inc.
ISSN:1044-8136
1097-0053
DOI:10.1002/jcaf.21875