<node id="63400">
  <nid>63400</nid>
  <type>external_news</type>
  <uid>
    <user id="27345"><![CDATA[27345]]></user>
  </uid>
  <created>1294324059</created>
  <changed>1475893455</changed>
  <title><![CDATA[Damage Control]]></title>
  <body><![CDATA[<p>Of all the security responsibilities facing the campus IT team, 
handheld-device security may be the most difficult. Since mobile malware
 and other threats were cited as the top IT security concerns by the 
"Emerging Cyber Threats Report for 2009," published by the Georgia Tech 
Information Security Center, smartphones have only become more 
ubiquitous as conveniences--and targets. <em>Source: CampusTechnology.com</em></p>]]></body>
  <field_article_url>
    <item>
      <url><![CDATA[http://campustechnology.com/articles/2010/01/01/damage-control.aspx]]></url>
      <title><![CDATA[]]></title>
    </item>
  </field_article_url>
  <field_publication>
    <item>
      <value><![CDATA[ emma bivings ]]></value>
    </item>
  </field_publication>
  <field_dateline>
    <item>
      <value>2010-01-05</value>
      <timezone></timezone>
    </item>
  </field_dateline>
  <field_media>
        </field_media>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
    <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
