{"id":7068,"date":"2014-07-10T06:35:00","date_gmt":"2014-07-10T11:35:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/if-you-operate-with-an-iphone-or-android-phone-you-might-be-in-for-a-security-struggle-if-your-device-is-lost-or-stolen\/"},"modified":"2014-07-10T06:35:00","modified_gmt":"2014-07-10T11:35:00","slug":"if-you-operate-with-an-iphone-or-android-phone-you-might-be-in-for-a-security-struggle-if-your-device-is-lost-or-stolen","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/if-you-operate-with-an-iphone-or-android-phone-you-might-be-in-for-a-security-struggle-if-your-device-is-lost-or-stolen\/","title":{"rendered":"If you operate with an iPhone or Android phone, you might be in for a security struggle if your device is lost or stolen."},"content":{"rendered":"

\"Mobile<\/p>\n

Your Exchange server can be configured to enforce minimum security requirements so that when a device attempts to connect but does not meet the credentials it will not be allowed access. Firms must regularly review policies on system configuration to ensure that precautions are being implemented to protect the firms shared data.<\/p>\n

Here are possible minimum requirements every business in {city} must have:<\/p>\n