Cyber Security Expo
 
Securing Mobile Devices: Be Smarter Than Your Smartphone by Duwane A. Brown on 16/10/08

Technology is forever changing. It has greatly changed how people communicate on a daily basis. Technology has also changed how we operate whether its home, business or school. Phone calls have gone from home phones to cell phones to Voice over IP. We no longer rely on using the United States Post Office Service as for mailing pictures, sending and receiving letters. Smart phones have greatly impacted the world with the ability to text message, take pictures and email are at our convenience. However some conveniences come with a price. Itís not the value of the smart phone, which could have been expense, is what we hold in high regard. Itís the information stored on the smart phone is what we truly treasure the most. Phone numbers, messages, email, addresses and pictures. All are and have been stored by us on smart phones and could be easily tampered by someone else. Whether itís considered personal or confidential, the information stored should be protected.

Most companies have supplied their work force with smart phones. The work force mainly consist of top executives to mid range managers. These individuals are in high demand and at times hard to reach. Therefore having smart phones available makes them easily accessible. They can now create or edit documents, presentations, email and hold meetings while mobile allowing them to multitask. But owning a smart phone does bring about additional rules that they have to abide by. The state of a company can be at risk based on the information stored on their smart phone. ďThe problem is, employees are using smartphones in their jobs, whether the security team is on board or not. In a July InformationWeek survey, 82% of smartphone owners said they use their devices to read business e-mail, 80% surfed corporate Web sites, and 61% accessed enterprise dataĒ. (Ginevan Feb 2008) A policy by the company must be set as for dos and doníts while possessing a smart phone. The first step in creating the policy should be training. Most users are handed their device and unaware how to use them and what risks are involved. The policy should be enforced by the user holding them accountable by signing a user agreement when they are issued a smart phone. A basic policy might include rules like these: Use the device for company purposes only; Always encrypt sensitive data; Never leave the device in a public place; Always lock the device when not in use; Use passwords and change them regularly; Sync and backup data regularly. (Thornberry, 2002)

This document is in PDF format. To view it click here.

Rate this article

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.