Sizing Up Mobile Vulnerabilities
It pays to find and fix the low-hanging fruit on your network. That’s where you get the most bang for your buck. The following mobile laptop, phone, and tablet weaknesses should be front and center on your priority list: No encryption Poorly implemented encryption No power-on passwords Easily guessed (or cracked) power-on passwords For other … Read more