{"id":2153,"date":"2006-09-28T00:00:00","date_gmt":"2006-09-28T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/09\/28\/one-in-three-managers-snub-mobile-security\/"},"modified":"2021-12-30T11:40:47","modified_gmt":"2021-12-30T11:40:47","slug":"one-in-three-managers-snub-mobile-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/09\/28\/one-in-three-managers-snub-mobile-security\/","title":{"rendered":"One in three managers snub mobile security"},"content":{"rendered":"<p>Fewer than 40 per cent of companies enforce a security policy for employees with mobile devices, an industry report has found.   Worse still, 35 per cent of general managers believe that a security policy for mobile use is not vital, and one in five IT managers agree with them, according to figures from the Securing The Enterprise study released by Orange Business Services.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Organisations and the individuals they employ have to take mobile security seriously while still ensuring that they can take advantage of the benefits,&#8221; said the report.<\/p>\n<p>However, the study concluded that if security is managed properly, the risks are acceptable given the possible gains for a company.<\/p>\n<p>http:\/\/www.vnunet.com\/vnunet\/news\/2165203\/managers-snub-mobile-security<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2153","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2153"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2153\/revisions"}],"predecessor-version":[{"id":4640,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2153\/revisions\/4640"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}