1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

5 security experts share their best tips for ‘fringe’ devices

Discussion in 'CSO' started by RSS, May 10, 2016.

  1. RSS

    RSS New Member Member

    What is a ‘fringe’ device in IT?

    For some, it’s a gadget everyone has forgotten about — a printer in a corner office, an Android tablet in a public area used to schedule conference rooms. A fringe device can also be one that’s common enough to be used in the office yet not so common that everyone is carrying one around or has one hooked up to the Wi-Fi every day.

    [ ALSO ON CSO: Think that printer in the corner isn’t a threat? Think again ]

    As with any security concern, many of these devices are overlooked. There might be security policies and software used to track and monitor iPads and Dell laptops, but what about the old HP printer used at the receptionist’s desk? In a hospital, it might be a patient monitoring device. In a more technical shop, it could be a new smartphone running an alternate operating system.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page