Skip to main content

Mobile Technology and Company Security: A Post Contributed by Steven Farrell*

The explosive growth of mobile technology has done wonders for business communications and employee productivity. Smart phones are now more than 15 percent of the handset market in the U.S. Tablet PCS are flying off the shelves and laptop computer sales remain strong. A person no longer needs to be in an office to retrieve, send or create important documents. GPS and tracking software on PDAs and smart phones make it easy to confirm where and employee is and what they're doing. Though these devices increase productivity, they are not without risks for companies and employees alike.

Data Theft

It is much easier to hack a cellular device than it is to tap a land line. While data encryption offers some control, it can be cracked by a determined expert. Theft is another problem. While many people treat their mobile devices as an appendage, they can still be left on a table in a restaurant or picked from a pocket in a crowd. If password protection is not rigorously used, sensitive corporate data can be lost or stolen. Wipe technology can also be installed, locking the device after several failed password attempts. A remote network administrator can then erase the device's memory if a security breach is suspected.

Data Transfer

Many mobile technology devices, particularly smart phones have a short service life before being upgraded. When exchanging one device for another, data should be backed up, then erased completely from the device's memory. Failure to do this can result in loss of proprietary information. A shocking number of smart phones and PDAs show up on eBay with company emails and documents still on board!

Voice Etiquette

While data can be lost, hacked or stolen from mobile devices, it can be much simpler than that. Astonishingly, many people still feel the need to raise their voices while talking on cell phones in lines, stores, coffee shops and airports. Forgetting that people can overhear what's being said should be addressed. Sensitive information should not be discussed in crowded or public areas.

Viruses and Spyware

With increased use of tablet PCs, laptops and smart phones comes increased exposure to viruses and spyware. Employees that use their company devices for social networking, shopping and surfing are particularly vulnerable. When the devices are linked back to the company network, viruses and spyware can corrupt or steal data.

Prevention

Developing a strict mobile IT policy is key to avoiding sensitive data. Enforcement of data encryption and password protection also help. Exclusive use of secured wireless networks will also help accidental loss of data over "evil twin" wireless hotspots. Updating of anti-spyware, anti-virus software and firewall protection is also important to keeping company information safe.

* Steven Farrell is the administrator of ReversePhoneLookup.org.

Comments

Popular posts from this blog

Yammer: A Social Networking Site Exclusively for the Workplace

Effective internal communications among employees are related to some desirable organizational outcomes, such as robust morale, a clear vision, low turnover, and high employee engagement. The question is what platform can serve the purpose. This ABC News video introduces “ Yammer ,” an exclusive internal communication tool for companies. A user must use a valid company e-mail address to sign up for an account. Once an account is validated, the user will be led to the company page that is pretty much like a Facebook page. The difference is that only the users whose e-mail addresses share the same domain can see the wall and communicate with each other. I have no question about whether Yammer could be a useful internal communication tool for companies, but I just wonder: how many social networking sites do people need for communication? Why people have to “create” so many platforms or channels for “effective communications”? To many people, Facebook is only for “friends,” whe

Luxury vs. Millennials and Their Technology: The Ritz-Carlton (By Julia Shorr)

Embodying the finest luxury experience, The Ritz-Carlton Hotel Company, LLC has been established since 1983. In 1998, Marriott International purchased the brand offering it more opportunity for growth while being independently owned and operated. They are known for their enhanced service level as the motto states, “Ladies and Gentlemen serving Ladies and Gentlemen”. The luxury brand now carries 97 hotels and resorts internationally and is attempting to keep the aspects of luxury while keeping up with the trends of the technologically improving generations. The Varying Demographics of the Target Market The Ritz-Carlton’s typical target market includes: business executives, corporate, leisure travelers, typically middle-aged persons and elders, and families from the upper and upper-middle class section of society .   This infers a large range of types of travelers in which all are similar in that they are not opposed to spending extra for the luxurious ambiance. However, with

How to choose the best credit cards for travel (By David Mai)

  Traveling in a Post-Pandemic World If there was one thing the pandemic taught us, it was that everybody became hesitant and unwilling to travel. Shaver (2020) of The Washington Post shared an interesting tidbit in which Americans were actually staying home less during the pandemic, according to research that tracks users' smartphone data.  The quarantine fatigue affected nearly everyone who lived an active lifestyle or loved to be out and about in the world. It was simply not a safe time, and too many regulations were in place that deterred consumers from traveling for leisure. Consequently, the COVID-19 pandemic significantly impacted the travel and hospitality industry. Yet, there is no doubt that people will yearn to travel again when the pandemic is fully lifted. Around this same time, credit card companies have developed unique ways to retain business with consumers who look to maximize rewards and benefits for their journey. A Little Preparation Goes a Long Way