{"63400":{"#nid":"63400","#data":{"type":"external_news","title":"Damage Control","body":[{"value":"\u003Cp\u003EOf all the security responsibilities facing the campus IT team, \nhandheld-device security may be the most difficult. Since mobile malware\n and other threats were cited as the top IT security concerns by the \n\u0022Emerging Cyber Threats Report for 2009,\u0022 published by the Georgia Tech \nInformation Security Center, smartphones have only become more \nubiquitous as conveniences--and targets. \u003Cem\u003ESource: CampusTechnology.com\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27345","created_gmt":"2011-01-06 14:27:39","changed_gmt":"2016-10-08 02:24:15","author":"Cristina Gonzalez","boilerplate_text":"","field_publication":"","publication":"emma bivings","field_article_url":"","publication_url":"http:\/\/campustechnology.com\/articles\/2010\/01\/01\/damage-control.aspx","dateline":{"date":"2010-01-05T00:00:00-05:00","iso_date":"2010-01-05T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}