The unveiling of the new Apple iPhone 5S and 5C was met with euphoria online yesterday (September 10th).
At an event in California, the tech giant showcased its latest gadgets in a bid to take more control of the market and reduce the commercial threat of rivals such as Samsung and Nokia.
The 5S features a fingerprint sensor, which is integrated within the phone to help identify the user, while the 5C features a plastic back and a choice of colours.
Both these handsets offer different pros and cons, but it is the 5S that could unlock new security possibilities for businesses, especially those that have rolled out their own bring your own device (BYOD) plans.
In an article for ZDNet, tech expert Adrian Kingsley-Hughes claimed that the Touch ID fingerprint reader will help to allay the worries of IT admin staff, who are often battling to find efficient security solutions.
"Touch ID will also bring two-factor authentication to the iPhone, combining something you know – a passcode – with something you have – your fingerprint – to dramatically boost security. This puts an extra level of security between users and the corporate network for enterprise and BYOD users," Mr Kingsley-Hughes explained.
He believes that Apple introduced the capability in an effort to combat the rising levels of iPhone crime.
However, the specialist lamented the fact that the feature is only available on the iPhone 5S, claiming that it is a "a shame" that users of the 5C are left without the groundbreaking technology.
Along with new innovations such as Apple's latest feature, businesses can boost their security plans by introducing data recovery policies.
By using this approach, any information that goes missing as a result of theft, error or a power outage, can be easily restored.
This is especially useful for particularly sensitive data, which must be protected at all costs from unauthorised personnel.
Complex data recovery requires expertise. Speak to the data recovery industry pioneers at Kroll Ontrack for free advice to investigate options to recover from any data loss type, system or cause.
Posted by Polly Button
No comments:
Post a Comment