{"id":14095,"date":"2013-05-02T12:11:02","date_gmt":"2013-05-02T19:11:02","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=14095"},"modified":"2013-05-02T12:11:02","modified_gmt":"2013-05-02T19:11:02","slug":"will-dods-idevice-security-approval-ease-byod-fears","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/","title":{"rendered":"Will DoD&#8217;s iDevice Security Approval Ease BYOD Fears?"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/holding-phone.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12615\" alt=\"holding-phone\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/holding-phone.jpg\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/holding-phone.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/holding-phone-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/holding-phone-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Security on mobile devices is both simpler and trickier than security on desktops. For starters, there\u2019s a much greater possibility of either loss or theft of the device, the trick is whether you can still manage to secure the data on it despite that fact.<\/p>\n<p>It seems the US Department of Defense is <a href=\"http:\/\/9to5mac.com\/2013\/05\/01\/dod-to-grant-apples-ios-6-samsung-galaxy-devices-security-approval-for-widespread-use-by-us-government-agencies\/\" target=\"_blank\">getting ready to give approval<\/a> for some use of iPad and iPhones by its employees (as well as some other devices), which would seem to imply that they feel reasonably confident that some smartphones have reached that point. Most companies won\u2019t have quite as much of a pressing need to secure data as the DoD, as it\u2019s generally the company\u2019s reputation rather than lives they\u2019re protecting. Nevertheless, their actions can still serve as a good bellwether for the state of security. If something is good enough for a government agency charged with defense, it should be good enough for company that \u201conly\u201d protects customer information.<\/p>\n<p>The developers of iOS have done a really remarkable job of locking down the OS. It wouldn\u2019t be such an event for a new Jailbreak tool to be released, if that was not the case. They\u2019ve put a lot of \u201cblast shields\u201d in place that limit the damage any one exploit can do, which means that rooting the device requires chaining a series of vulnerabilities together. And these vulnerabilities seem to be a little more difficult to find with each new version. Not impossible, still, but the bar is set quite high for both the skill level and time required.<\/p>\n<p>This strikes me as a good sign for mobile device developers taking security more seriously. For most companies, if you can hammer out the specifics in a policy that <a href=\"https:\/\/www.intego.com\/mac-security-blog\/think-twice-before-you-bring-your-device-to-work\/\">makes sense both for the company and employees<\/a>, letting them use their own devices can genuinely be a reasonable option in some cases.<\/p>\n<p><em><span style=\"font-size: x-small;\">holding iPhone photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/ari\/4733062911\/\">Steve Rhodes<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/2.0\/\">cc<\/a><\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security on mobile devices is both simpler and trickier than security on desktops. For starters, there\u2019s a much greater possibility of either loss or theft of the device, the trick is whether you can still manage to secure the data on it despite that fact. It seems the US Department of Defense is getting ready [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":14099,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7],"tags":[363,387,319],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Security on mobile devices is both simpler and trickier than security on desktops. For starters, there\u2019s a much greater possibility of either loss or\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Will DoD&#039;s iDevice Security Approval Ease BYOD Fears? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Security on mobile devices is both simpler and trickier than security on desktops. For starters, there\u2019s a much greater possibility of either loss or\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-02T19:11:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/FTholding-phone.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"440\" \/>\n\t<meta property=\"og:image:height\" content=\"264\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/FTholding-phone.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/FTholding-phone.jpg\",\"width\":440,\"height\":264},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/\",\"name\":\"Will DoD's iDevice Security Approval Ease BYOD Fears? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#primaryimage\"},\"datePublished\":\"2013-05-02T19:11:02+00:00\",\"dateModified\":\"2013-05-02T19:11:02+00:00\",\"description\":\"Security on mobile devices is both simpler and trickier than security on desktops. For starters, there\\u2019s a much greater possibility of either loss or\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Will DoD&#8217;s iDevice Security Approval Ease BYOD Fears?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Will DoD&#8217;s iDevice Security Approval Ease BYOD Fears?\",\"datePublished\":\"2013-05-02T19:11:02+00:00\",\"dateModified\":\"2013-05-02T19:11:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#webpage\"},\"wordCount\":334,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/FTholding-phone.jpg\",\"keywords\":[\"Bring Your Own Device (BYOD)\",\"iDevice\",\"Security\"],\"articleSection\":[\"Apple\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Security on mobile devices is both simpler and trickier than security on desktops. For starters, there\u2019s a much greater possibility of either loss or","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/","og_locale":"en_US","og_type":"article","og_title":"Will DoD's iDevice Security Approval Ease BYOD Fears? - The Mac Security Blog","og_description":"Security on mobile devices is both simpler and trickier than security on desktops. For starters, there\u2019s a much greater possibility of either loss or","og_url":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-05-02T19:11:02+00:00","og_image":[{"width":440,"height":264,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/FTholding-phone.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/FTholding-phone.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/FTholding-phone.jpg","width":440,"height":264},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/","name":"Will DoD's iDevice Security Approval Ease BYOD Fears? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#primaryimage"},"datePublished":"2013-05-02T19:11:02+00:00","dateModified":"2013-05-02T19:11:02+00:00","description":"Security on mobile devices is both simpler and trickier than security on desktops. For starters, there\u2019s a much greater possibility of either loss or","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Will DoD&#8217;s iDevice Security Approval Ease BYOD Fears?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Will DoD&#8217;s iDevice Security Approval Ease BYOD Fears?","datePublished":"2013-05-02T19:11:02+00:00","dateModified":"2013-05-02T19:11:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#webpage"},"wordCount":334,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/FTholding-phone.jpg","keywords":["Bring Your Own Device (BYOD)","iDevice","Security"],"articleSection":["Apple"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/will-dods-idevice-security-approval-ease-byod-fears\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/FTholding-phone.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3Fl","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/14095"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=14095"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/14095\/revisions"}],"predecessor-version":[{"id":14111,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/14095\/revisions\/14111"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/14099"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=14095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=14095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=14095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}