<node id="67361">
  <nid>67361</nid>
  <type>external_news</type>
  <uid>
    <user id="27154"><![CDATA[27154]]></user>
  </uid>
  <created>1308310493</created>
  <changed>1475893483</changed>
  <title><![CDATA[Damage Control]]></title>
  <body><![CDATA[<p>Of all the security responsibilities facing the campus IT team, handheld-device security may be the most difficult. Since mobile malware and other threats were cited as the top IT security concerns by the Emerging Cyber Threats Report for 2009, published by the Georgia Tech Information Security Center, smartphones have only become more ubiquitous as conveniences--and targets. <br /></p>]]></body>
  <field_article_url>
    <item>
      <url><![CDATA[http://campustechnology.com/articles/2010/01/01/damage-control.aspx]]></url>
      <title><![CDATA[]]></title>
    </item>
  </field_article_url>
  <field_publication>
    <item>
      <value><![CDATA[ emma bivings ]]></value>
    </item>
  </field_publication>
  <field_dateline>
    <item>
      <value>2010-01-05</value>
      <timezone></timezone>
    </item>
  </field_dateline>
  <field_media>
        </field_media>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
    <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
