This article can also be found in the Premium Editorial Download "Information Security magazine: Security researchers on biometrics, insider threats, encryption and virtualization."
Download it now to read this article plus other related content.
STRIKING A BALANCE
However, establishing a strategy that addresses mobile device diversity appears to be critical. According to Gold, many companies don't really have a strategy--they either ignore non-standard devices or deal with them ad hoc.
"The first step is building a [more comprehensive] strategy," says Gold. "Talk to users about what they want, what they need, and tell them what you can do for them. When there are enough people using a given exception, then you can test it and secure it and bring it onto the corporate standard list. It's an evolutionary process."
This was first published in November 2008