{"id":5987,"date":"2018-11-28T15:26:31","date_gmt":"2018-11-28T20:26:31","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/?p=5987"},"modified":"2018-11-28T15:26:31","modified_gmt":"2018-11-28T20:26:31","slug":"from-pins-to-prints-smartphone-locks-and-mobile-device-security","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/2018\/11\/28\/from-pins-to-prints-smartphone-locks-and-mobile-device-security\/","title":{"rendered":"From PINs to Prints: Smartphone Locks and Mobile Device Security"},"content":{"rendered":"<p>Smartphone security is one of the topics we recently explored in the 2018 <em><a href=\"https:\/\/www.wombatsecurity.com\/blog\/user-risk-report-reveals-poor-cybersecurity-habits-of-global-workers\" target=\"_blank\" rel=\"noopener\">User Risk Report<\/a><\/em>. When we surveyed 6,000 working adults across six countries\u00a0\u2014 the US, UK, France, Germany, Italy, and Australia \u2014 more than 90% of respondents said they use a smartphone, and <strong>39% of these use their devices for both personal and business activities<\/strong>. In the BYOD era, that means infosec teams should be keenly aware of how individuals\u2019 poor cybersecurity behaviors can affect their organizations\u2019 security posture.<\/p>\n<p>https:\/\/www.wombatsecurity.com\/blog\/from-pins-to-prints-smartphone-locks-and-mobile-device-security<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smartphone security is one of the topics we recently explored in the 2018 User Risk Report. When we surveyed 6,000 working adults across six countries\u00a0\u2014 the US, UK, France, Germany, Italy, and Australia \u2014 more than 90% of respondents said they use a smartphone, and 39% of these use their devices for both personal and [&hellip;]<\/p>\n","protected":false},"author":17266,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[717225],"tags":[],"class_list":{"0":"post-5987","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-12-it-security","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/users\/17266"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/comments?post=5987"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5987\/revisions"}],"predecessor-version":[{"id":5988,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5987\/revisions\/5988"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/media?parent=5987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/categories?post=5987"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/tags?post=5987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}