How to Deploy Mobile Devices and Keep Employees Happy AND Safe

Security

Inside BlackBerry for Business Blog

Modern hipster businessman drinking espresso coffee in the city cafe during lunch time and using mobile phone Modern hipster businessman drinking espresso coffee in the city cafe during lunch time and using mobile phone

“Wall of Sheep” sounds like an adorable Angry Birds clone involving woolly farm animals. But as I learned during BlackBerry Security Director Alex Manea’s webinar earlier today, it’s not cute at all: a huge televised projection at the annual Black Hat conference that displays the names and (partial) passwords of attendees using non-secured devices – into which other attendees have hacked.

It’s embarrassing frontier justice, but appropriate – Black Hat is the premier security hacker conference, and its attendees should know better. Alas, too many IT managers still fail to take steps to prevent simple hacks like the one above.

“I talk to lots of IT managers and many of them, when asked, can’t tell me exactly what their devices are connecting to,” Manea said during his presentation, entitled To BYOD or…

View original post 397 more words

About Eric Lai

I have written about technology and mobility for Computerworld, ZDNet, Forbes and others. I oversee the blogs and social content at BlackBerry Ltd. and continue to track and opine about the latest news and trends in enterprise mobility. Follow me on Twitter (@ericylai)

Join the conversation

Show comments Hide comments
+ -
blog comments powered by Disqus