Executive management approved the storage of sensitive data on smartphones and tablets as long as they were encrypted. Later a vulnerability was announced at an information security conference that allowed attackers to bypass the device's authentication process, making the data accessible. The smartphone manufacturer said it would take six months for the vulnerability to be fixed and distributed through the cellular carriers. Four months after the vulnerability was announced, an employee lost his tablet and the sensitive information became public.
What was the failure that led to the information being lost?
Adell
3 months agoJade
3 months agoSoledad
3 months agoTwanna
4 months agoEura
4 months agoSolange
4 months agoTrevor
4 months agoVanesa
4 months agoArlie
5 months agoAnnamae
5 months agoRessie
5 months agoDong
5 months agoRodolfo
5 months agoAshleigh
5 months agoYvette
9 months agoAlva
9 months agoMadalyn
8 months agoAmie
8 months agoAlyce
8 months agoSelene
8 months agoCecily
9 months agoOlen
9 months agoDona
9 months agoClaudia
10 months agoElvis
8 months agoQuentin
9 months agoSherill
9 months agoAdell
9 months agoRanee
10 months agoJean
11 months agoBecky
11 months agoTricia
9 months agoAnnice
9 months agoErick
10 months agoBambi
10 months agoElin
11 months agoClaudia
11 months agoDalene
11 months ago