Why Corporations Covet 'Kill Switches'

This diagram shows phones on a wireless network communicating with each other through text messages. The bigger the cluster of connections, the more likely the text is spam or a virus

For corporate technology managers, it pays to be a control freak. Hackers, insiders, and rivals all pose risks to intellectual property, and it’s easy to see the wisdom in keeping an iron-fisted grip on the network.

To continue reading this article you must be a Bloomberg Professional Service Subscriber.