- The iPhone 3G S has to be in the physical possession of the hacker (instead of an over-the-air attack).
- The iPhone can be wiped remotely (however, MobileMe, push, and Find My iPhone must be turned on, and must be connected to the internet).
- The iPhone is more likely to be profiled as a valuable piece of hardware than for its data potential–the BlackBerry is a well-recognized business device and would be a more likely target for data thieves.
Some additional thoughts:
- The iPhone has thus far been a consumer device, although the trickle in enterprise adoption makes this alarm-sounding well timed.
- Apple does not currently provide enterprise management software for either desktops or phones, which (beyond security) is probably the greatest barrier to enterprise acceptance.