Managing Bluetooth at work: Part 1

The proliferation of phones, PDAs, computers and other devices that support and use Bluetooth wireless networking technology has created another headache for IT managers trying to manage wireless data services in the enterprise.

Click here to read part 2 of this feature.


The risk

How to protect

Advertisement - Article continues below

Don't accept every file you are being send, just click 'no' Disable Bluetooth if not required Pair in 'secure' places Hold your Bluetooth vendor accountable for vulnerabilities

Click here to read part 2 of this feature.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now



Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019

Five signs that it’s time to retire IT kit

29 Nov 2019
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019