Skip to main content

Mobile Technology and Company Security: A Post Contributed by Steven Farrell*

The explosive growth of mobile technology has done wonders for business communications and employee productivity. Smart phones are now more than 15 percent of the handset market in the U.S. Tablet PCS are flying off the shelves and laptop computer sales remain strong. A person no longer needs to be in an office to retrieve, send or create important documents. GPS and tracking software on PDAs and smart phones make it easy to confirm where and employee is and what they're doing. Though these devices increase productivity, they are not without risks for companies and employees alike.

Data Theft

It is much easier to hack a cellular device than it is to tap a land line. While data encryption offers some control, it can be cracked by a determined expert. Theft is another problem. While many people treat their mobile devices as an appendage, they can still be left on a table in a restaurant or picked from a pocket in a crowd. If password protection is not rigorously used, sensitive corporate data can be lost or stolen. Wipe technology can also be installed, locking the device after several failed password attempts. A remote network administrator can then erase the device's memory if a security breach is suspected.

Data Transfer

Many mobile technology devices, particularly smart phones have a short service life before being upgraded. When exchanging one device for another, data should be backed up, then erased completely from the device's memory. Failure to do this can result in loss of proprietary information. A shocking number of smart phones and PDAs show up on eBay with company emails and documents still on board!

Voice Etiquette

While data can be lost, hacked or stolen from mobile devices, it can be much simpler than that. Astonishingly, many people still feel the need to raise their voices while talking on cell phones in lines, stores, coffee shops and airports. Forgetting that people can overhear what's being said should be addressed. Sensitive information should not be discussed in crowded or public areas.

Viruses and Spyware

With increased use of tablet PCs, laptops and smart phones comes increased exposure to viruses and spyware. Employees that use their company devices for social networking, shopping and surfing are particularly vulnerable. When the devices are linked back to the company network, viruses and spyware can corrupt or steal data.

Prevention

Developing a strict mobile IT policy is key to avoiding sensitive data. Enforcement of data encryption and password protection also help. Exclusive use of secured wireless networks will also help accidental loss of data over "evil twin" wireless hotspots. Updating of anti-spyware, anti-virus software and firewall protection is also important to keeping company information safe.

* Steven Farrell is the administrator of ReversePhoneLookup.org.

Comments

Popular posts from this blog

Luxury vs. Millennials and Their Technology: The Ritz-Carlton (By Julia Shorr)

Embodying the finest luxury experience, The Ritz-Carlton Hotel Company, LLC has been established since 1983. In 1998, Marriott International purchased the brand offering it more opportunity for growth while being independently owned and operated. They are known for their enhanced service level as the motto states, “Ladies and Gentlemen serving Ladies and Gentlemen”. The luxury brand now carries 97 hotels and resorts internationally and is attempting to keep the aspects of luxury while keeping up with the trends of the technologically improving generations. The Varying Demographics of the Target Market The Ritz-Carlton’s typical target market includes: business executives, corporate, leisure travelers, typically middle-aged persons and elders, and families from the upper and upper-middle class section of society .   This infers a large range of types of travelers in which all are similar in that they are not opposed to spending extra for the luxurious ambiance. However, with

Is It OK for Hotel Staff to Wear Piercings and Tattoos?

Time has changed. I see more and more college students wearing piercings and tattoos nowadays, but is it OK for hotel staff to wear piercings and tattoos? The answer is “no, no, no.” According a report at USAToday.com, customers across the board do not want to see any hotel workers with pierced eyebrow, pierced tongue, tattooed arm, or nose ring. Some may argue that tattooed and pierced workers may seem more acceptable in edgy boutique hotels as compared to the big franchised hotels, but the survey results did not find any differences among a variety of lodging products. Many respondents believe people who wear visible tattoos and piercings are taking a high risk of their professional lives. If you stay in a hotel, do you mind being served by tattooed and/or pierced staff? What if you are the one who makes the hiring decision? References: USAToday.com: http://tinyurl.com/linchikwok08042010 Picture was downloaded from http://tinyurl.com/linchikwok08042010P

In what ways will AI affect restaurant operations?

A new wave of industrial revolution is here --- AI (artificial intelligence) will change everything we do. Undoubtedly, AI can improve restaurant operations.     Menu Engineering and Quality Control    AI can provide insights into a restaurant’s menu offerings and pricing strategies based on consumer data and market trends. Restaurant owners can adjust the recipes/menu and price accordingly.     AI can help restaurants monitor food temperature, cleanliness, and safety procedures, ensuring they comply with health and safety regulations. For example, AI can remind a sushi chef to replace a sushi plate that has been “sitting” on the conveyor belt for too long with a more popular item.     Consumer Experience   AI can help restaurants create location-based, personalized marketing campaigns to reach specific and targeted customers at the right time. Then, AI-empowered chatbots, reservation, and table management systems can help restaurants answer customer inquiries, manage reservations, and