IT Managers Get Strict About Mobile Device Security

 
 
By Don Reisinger  |  Posted 2011-12-08 Email Print this article Print
 
 
 
 
 
 
 


 

5. Privacy is practically nonexistent

Whenever one talks about security, they must also consider privacy. In the mobile market, it's clear, especially in light of the recent Carrier IQ controversy, that privacy doesn't exist. If consumers use their smartphones and tablets with care and take action to protect themselves, there is less chance they will suffer a personal data beach even if they're attacked by malware.

6. iOS might come into the crosshairs

Android is currently the top destination for mobile malware, but in the coming years, it's quite likely that iOS will become an increasingly popular target for cyber-criminals. After all, iPhone and iPad sales are skyrocketing and Apple's mobile market share is still quite strong. Cyber-criminals are after revenue, and they can generate that on iOS.

7. It's not just software-based

Talk of security in the mobile market typically revolves around software problems. However, it's important for product owners to know that simply having the devices can cause security issues. Is the respective smartphone or tablet password-protected? Has it been left unattended? Did someone steal it? Those threats are real, and they can result in a serious breach of security.

8. Flash really is a threat

Adobe's decision to ditch plans to offer Flash in the mobile market is a good one. Whether or not Apple haters like to admit it, Steve Jobs was right when he said Adobe's platform is a yawning security hole on the desktop. It is an equally worrisome security threat in the mobile space. Luckily, Flash won't be around much longer, but until it's eradicated from the mobile market, consider it a potential security threat.

9. The bad people are watching-everything

More recently, research firms have been looking at the ways in which scammers are accessing mobile devices. Not surprisingly, they're peering into sent text messages and the phone numbers that are dialed. They reason that by accessing that information, they might be able to get sensitive data or, even better, personal information that can be used when trying to steal money from someone. The cyber-criminals are watching everything. Keep that in mind.

10. Expect the IT department to react

All these threats surrounding mobile devices are forcing the IT departments at companies around the globe to set strict mobile device policies. IT executives are limiting phone and tablet selections, banning employees from downloading applications, and even monitoring devices to ensure they're not engaging in insecure activities. It's unfortunate, but to stay safe today, constant control and surveillance is important.

Follow Don Reisinger on Twitter by clicking here 




 
 
 
 
Don Reisinger is a freelance technology columnist. He started writing about technology for Ziff-Davis' Gearlog.com. Since then, he has written extremely popular columns for CNET.com, Computerworld, InformationWeek, and others. He has appeared numerous times on national television to share his expertise with viewers. You can follow his every move at http://twitter.com/donreisinger.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date
Rocket Fuel