The whole culture of Bring Your Own Device (BYOD) in the workplace has reignited the mobile device security debate. Although there are many ways to protect data, the first line of defence when a mobile device (be it a tablet or smartphone) is lost or stolen is almost always going to be a password of some kind. I'm not going to get into the relative merits of PINs and passwords against more robust methods of data protection, that's for another time, instead let's just focus on the use of passwords. Have you ever wondered how many people are actually using …

Member Avatar
+1 forum 0

New research from ISACA suggests that US consumers with 'work-supplied' computing devices intend, on average, to spend nine hours shopping for gifts on them during the forthcoming holiday season. When it comes to the Bring Your Own Device (BYOD) brigade, those who use personal mobile devices for work, that average goes up to 12 hours. ![dweb-shopper](/attachments/small/0/dweb-shopper.jpg "align-right") According to [ISACA‚Äôs 2012 IT Risk/Reward Barometer](http://www.isaca.org/Pages/2012-Risk-Reward-Barometer.aspx), those who mix their time between work-supplied computers and their own mobile devices will happily reveal email addresses (58%) and mother's maiden name (15%) in order to garner a 50% discount on a $100 item. This …

Member Avatar
Member Avatar
+1 forum 1

The End.