Mobile Device Security: Use 'Em, Don't Lose 'Em
Last week's <a href="http://www.bmighty.com/blog/main/archives/2007/11/bmighty_bmobile.html">bMighty bMobile Virtual Expo</a> included an observation about handheld device security that was stunner: 30 percent of handhelds are lost every year.
Last week's bMighty bMobile Virtual Expo included an observation about handheld device security that was stunner: 30 percent of handhelds are lost every year.Really? Security trainer SANS Institute says so, and even if they're off by a factor of a third, that's still close to one in five handhelds leaving the hands that should be holding them.
And as our handheld devices become more and more powerful -- and consequently more and more central to the way we do business -- that means more and more business, confidential and (for some of you) compliance-regulated data being lost along with the phone or Blackberry.
Not good!
And it gets worse -- the same presentation included RSA figures showing that close to a quarter of all users keep password lists on their handhelds. The same devices that a quarter to a third of them are likely to lose in the coming year.
How do small and midsize businesses best address this? In addition to fundamental security procedures, practices and policies about what can and cannot be kept on the devices, it may be time to take a "Mom and the mittens" approach: put some yarn on the handhelds and tie them to the employees' wrists.
Probably won't work any better than Mom's yarn did in preventing missing mittens, but it would send a message about the sort of behavior that leads to lost data devices.
Read more about:
2007About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024