Subscribe       Feed   All Posts     Search by Topic:

Your iPad Is Not Your iPhone: Get Secure

Blog Image: 

Over the past year, we've seen the iPad become more prevalent in the corporate world – and why not? Its portability is ideal for employees on the go and users are able to blend work and personal use on a single device. Yet, it’s these two benefits that have introduced new security concerns for IT, with the iPad often treated more like a grown up iPhone than a corporate computer.

Of course, the laid back attitude towards iPad security is understandable. Tablet adoption has been predominantly driven by consumer usage, with public Wi-Fi and cloud computing making it simple to upload and download files and applications at will – whether Angry Birds, grocery coupons or the latest corporate PowerPoint.  But, the freedom of anytime, anywhere access, combined with the increased volume of corporate data being shared via iPads, has blurred the lines between corporate access and casual entertainment.

Yet, the harsh reality is that malicious apps and malware are the number one security threat to tablet computers, followed by public Wi-Fi eavesdropping.  Phishing attacks are phishing attacks, whether your users are on a PC or an iPad, and enterprises need to implement the same strong security measures regardless of the device.

So, what’s an IT group to do?

Individuals should be able to send, share, and access files and applications, while you ensure they’re protected from malicious content. Accellion Secure Mobile Apps is one viable option – providing around-the-clock secure access to files to a range of mobile devices, plus encrypting documents for future, offline use. Plus, if the device is ever lost or stolen, administrators can easily block access remotely and reset credentials.

Let’s face it: your employees were likely attracted to the iPad because it makes their life easier – and maybe a little more fun. So, the key is to boost security while enabling employees to work and interact exactly as they do today.  The discussion on tablet security is far from over, so look for more insight on our blog.

See All Blog Posts >>