The problem is that by their very nature, they are not fixed, not commonly managed by the IT organization and can be lost, stolen or are open to abuse. Without being part of a corporate IT policy, but still being able to gain access to and organizations resources, the danger is that in the wrong pair of hands they provide an open access channel into an organization's applications.
|