Premium Content

Access "Getting serious about tablet security risks and user training"

Published: 13 Oct 2012

We are used to rapid change in the IT world, but the last two years rank as exceptional. Since January 2010, when the late Steve Jobs announced the iPad, the way we use computers has changed dramatically. The iPad, followed shortly after by other tablet computers running the Android operating system from Google, immediately caught the imagination of people of all ages and occupations. Although designed primarily as a platform of audio-visual media and Web content, the tablet took off like no other format before it as a general-purpose computing device that was easy to carry, easy to use, always on – and also looked pretty cool. Tablets had existed before, of course, including the Apple Newton of 25 years ago, but this time a lot of component factors fell into place: the wide availability of Wi-Fi connections, high-speed wireless communications, more powerful processors, improved screen technologies and better batteries. Security pros need to ensure that if users want to use these new devices, they understand they have a duty of care and a responsibility to ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Managing digital projects
    CWE_211014_ezine_25p-MED.jpg
    E-Zine

    In this week’s Computer Weekly, we examine the project management challenges for IT teams that are building digital, agile systems. We look at the ...

  • The MPS opportunity for SMBs
    MPS-opportunity-for-SMBs-252.jpg
    E-Handbook

    Analysts Louella Fernandes and Clive Longbottom examine the need for Managed Print Services (MPS) and how SMBs are faring as they embark on their MPS...

  • CW Buyer's Guide to Security Analytics
    CWE-BG-0414-security-analytics-252.jpg
    E-Handbook

    Computer Weekly looks at how organisations are gathering intelligence to stay ahead of emerging threats; the importance of gathering data throughout ...