Defeating Malicious Mobiles
By Lisa Phifer
Published April 2007; Posted August 2007



Business use of mobile devices has surged, spurred by improvements in processing, storage and connectivity. Smart phone sales tripled in 2005, doubling again just six months later. By November 2006, 49 percent of surveyed companies reported significant use of mobile devices to transmit business-critical data. IDC expects this trend to continue through 2009, when one-quarter of the global workforce will depend on mobile devices to conduct business. These new devices increase both business productivity and risk exposure. Yesterday’s handhelds were limited to contact management and short messaging. But today’s PDAs and smart phones are true mobile computers, connected with growing regularity and speed to corporate networks. Many run business applications like field service or sales force automation, while most routinely transmit business data, ranging from regulated customer records to intellectual property. Companies that fail to recognize this paradigm shift and assert IT control over mobile devices may be in for a nasty surprise. When it comes to gaining back-door access to corporate networks, unprotected PDAs and smart phones are low-hanging fruit, ripe for the picking.


Access paper

Approx. 296 kB


For help with .pdf file downloads, please check out the help topic.


Return to Security Webtorials menu


Return to Voice over Packet Webtorials menu


Return to Business Communications Review Gold Sponsor Archives

About the author:

Lisa Phifer is an owner and principal consultant at Core Competence, a network security technology consulting firm based in Chester Springs, PA. A 25-year veteran of the networking industry, Lisa has been involved in mobile security since 1997.


This article is reproduced by special arrangement with our partner, Business Communications Review.


Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at