10 Mobile Security, BYOD Privacy And Security Myths

1. User Privacy Is Invaded By BYOD Management

When employees become conscious of mobile device management (MDM) features, such as requiring a PIN code or a remote wipe capabilities, at all times, it may call into question how much IT is monitoring the device. However, Bluebox believes the right implementations don't cross the privacy line; they don't track activity on the device nor do they read personal data, and that should be communicated to end users.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.