Skip to main content

Mobile Technology and Company Security: A Post Contributed by Steven Farrell*

The explosive growth of mobile technology has done wonders for business communications and employee productivity. Smart phones are now more than 15 percent of the handset market in the U.S. Tablet PCS are flying off the shelves and laptop computer sales remain strong. A person no longer needs to be in an office to retrieve, send or create important documents. GPS and tracking software on PDAs and smart phones make it easy to confirm where and employee is and what they're doing. Though these devices increase productivity, they are not without risks for companies and employees alike.

Data Theft

It is much easier to hack a cellular device than it is to tap a land line. While data encryption offers some control, it can be cracked by a determined expert. Theft is another problem. While many people treat their mobile devices as an appendage, they can still be left on a table in a restaurant or picked from a pocket in a crowd. If password protection is not rigorously used, sensitive corporate data can be lost or stolen. Wipe technology can also be installed, locking the device after several failed password attempts. A remote network administrator can then erase the device's memory if a security breach is suspected.

Data Transfer

Many mobile technology devices, particularly smart phones have a short service life before being upgraded. When exchanging one device for another, data should be backed up, then erased completely from the device's memory. Failure to do this can result in loss of proprietary information. A shocking number of smart phones and PDAs show up on eBay with company emails and documents still on board!

Voice Etiquette

While data can be lost, hacked or stolen from mobile devices, it can be much simpler than that. Astonishingly, many people still feel the need to raise their voices while talking on cell phones in lines, stores, coffee shops and airports. Forgetting that people can overhear what's being said should be addressed. Sensitive information should not be discussed in crowded or public areas.

Viruses and Spyware

With increased use of tablet PCs, laptops and smart phones comes increased exposure to viruses and spyware. Employees that use their company devices for social networking, shopping and surfing are particularly vulnerable. When the devices are linked back to the company network, viruses and spyware can corrupt or steal data.

Prevention

Developing a strict mobile IT policy is key to avoiding sensitive data. Enforcement of data encryption and password protection also help. Exclusive use of secured wireless networks will also help accidental loss of data over "evil twin" wireless hotspots. Updating of anti-spyware, anti-virus software and firewall protection is also important to keeping company information safe.

* Steven Farrell is the administrator of ReversePhoneLookup.org.

Comments

Popular posts from this blog

Luxury vs. Millennials and Their Technology: The Ritz-Carlton (By Julia Shorr)

Embodying the finest luxury experience, The Ritz-Carlton Hotel Company, LLC has been established since 1983. In 1998, Marriott International purchased the brand offering it more opportunity for growth while being independently owned and operated. They are known for their enhanced service level as the motto states, “Ladies and Gentlemen serving Ladies and Gentlemen”. The luxury brand now carries 97 hotels and resorts internationally and is attempting to keep the aspects of luxury while keeping up with the trends of the technologically improving generations. The Varying Demographics of the Target Market The Ritz-Carlton’s typical target market includes: business executives, corporate, leisure travelers, typically middle-aged persons and elders, and families from the upper and upper-middle class section of society .   This infers a large range of types of travelers in which all are similar in that they are not opposed to spending extra for the luxurious ambiance. However, w...

Is It OK for Hotel Staff to Wear Piercings and Tattoos?

Time has changed. I see more and more college students wearing piercings and tattoos nowadays, but is it OK for hotel staff to wear piercings and tattoos? The answer is “no, no, no.” According a report at USAToday.com, customers across the board do not want to see any hotel workers with pierced eyebrow, pierced tongue, tattooed arm, or nose ring. Some may argue that tattooed and pierced workers may seem more acceptable in edgy boutique hotels as compared to the big franchised hotels, but the survey results did not find any differences among a variety of lodging products. Many respondents believe people who wear visible tattoos and piercings are taking a high risk of their professional lives. If you stay in a hotel, do you mind being served by tattooed and/or pierced staff? What if you are the one who makes the hiring decision? References: USAToday.com: http://tinyurl.com/linchikwok08042010 Picture was downloaded from http://tinyurl.com/linchikwok08042010P

How to Convince AI that You Are the Best Candidate for the Job

Last week, we discussed how more companies used AI to screen resumes and analyze job candidates’ performance in the initial interviews. We called for companies’ attention to the  potential AI biases in hiring . This week, we will visit what job candidates can do to help AI pick us and recommend us for hiring. A. Writing a Resume Tailored to AI Screening First and foremost, job candidates must thoroughly research the job and the company to understand its job descriptions and organizational culture. From there, they can: Write the resume in Word and submit it as a Word document instead of a PDF file. Select a straightforward format and avoid using graphics, charts, or complex layouts that could confuse AI. Use headings effectively to help AI pick up the content it seeks, such as “Relevant Job Experience” and “Education.” Strategically pick the relevant keywords that match the job descriptions as the job candidates describe what they perform(ed) at work. Highlight their achievements a...