Clearinghouses for apps; not all apps are secure and not all apps are for business purposes
. Getting access to the mobile devices operating system, which you don't normally have access to; usually requires custom firmware and is a way to circumvent security
. Loading apps outside of the normal approved app store
. Allowing your phone to go between carriers; may be illegal in some countries; can pose security risks
. Carrier sends firmware and OS updates that don't require being plugged in; patches can be significant and could cause app problems so could be a risk
. Tough to manage, many security teams will either disable or geofence to control it through the MDM
. Texting could lead to leaks, can be limited or controlled by MDM
. The device may appear as an external storage device, which can pose dangers of leaking data
. Connect mobile devices directly together - no computer needed - part of USB 2.0 used in Android devices
. Can be allowed or disallowed or geofenced
. Could show where you took the pic, and could be used to track you; could be significant risk if images are loaded to social media without metadata removed
. Allows 2 mobile devices to communicate directly with each other without an access point but must be enabled on both devices
. Turn your mobile phone into a hotspot - carrier may or may not allow it - could be used as a rogue access point
. If it has NFC, could be used for this - but it creates a risk so MDM can enable or disable it
.
|