Defeating Malicious Mobiles
By Lisa Phifer
Published April 2007; Posted August 2007
Business use of mobile devices has
surged, spurred by improvements in processing, storage and connectivity. Smart
phone sales tripled in 2005, doubling again just six months later. By November
2006, 49 percent of surveyed companies reported significant use of mobile
devices to transmit business-critical data. IDC expects this trend to continue
through 2009, when one-quarter of the global workforce will depend on mobile
devices to conduct business. These new devices increase both business
productivity and risk exposure. Yesterday’s handhelds were limited to contact
management and short messaging. But today’s PDAs and smart phones are true
mobile computers, connected with growing regularity and speed to corporate
networks. Many run business applications like field service or sales force
automation, while most routinely transmit business data, ranging from regulated
customer records to intellectual property. Companies that fail to recognize this
paradigm shift and assert IT control over mobile devices may be in for a nasty
surprise. When it comes to gaining back-door access to corporate networks,
unprotected PDAs and smart phones are low-hanging fruit, ripe for the picking.
About the author:
Lisa Phifer is an owner and principal consultant at Core Competence, a network security technology consulting firm based in Chester Springs, PA. A 25-year veteran of the networking industry, Lisa has been involved in mobile security since 1997.
This article is reproduced by special arrangement with our partner, Business Communications Review.
Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information. Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site. Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.