A Portable Security Risk

More and more employees are bringing personal mobile devices, such as media players, flash drives and smart phones, to work for entertainment, communications and other purposes. Equally, many employers issue their staff with such devices to allow them to be more mobile and to run business applications as part of their job.

This explosion of personal devices with built in web connectivity, office applications and email can improve working practices but also comes with risks not limited to time wasting. The portability, connectivity, and storage capacity of mobile devices means they bring with them the threat of data leakage, data theft, and the introduction of viruses or other malware into workplace computing systems.

Computer scientists Sean Garrity and George Weir of the University of Strathclyde, in Glasgow, writing in the International Journal of Electronic Security and Digital Forensics, outline some of the problems associated with the enormous growth in mobile technology and explain how those concerns might be addressed. Portable storage devices of every ilk whether mp3 player or mobile phone now have several ways of connecting to other devices and networks including wi-fi, Bluetooth, and USB. Many of these devices also now have several gigabytes of storage capacity and are often expandable and so have the ability to capture vast quantities of data, whether for legitimate work purposes or for illicit use. Continue reading.

Related Posts

New Security Threat Against ‘Smart Phone’ Users Computer scientists at Rutgers University have shown how a familiar type of personal computer security threat can now attack new generations of smart ...
Malicious Software: Hiding the Honeypots Armies of networked computers that have been compromised by malicious software are commonly known as Botnets. Such Botnets are usually used to carry o...
In Networks We Trust European researchers are proposing a paradigm-shifting solution to trusted computing that offers better security and authentication with none of the d...
How Android Security Stacks Up Today's smart phones have all the speed, storage, and network connectivity of desktop computers from a few years ago. Because of this, they're a treas...
How to manage disk encryption passphrases and key slots Disk encryption is one method you may use to enhance the physical security rating of your computer. From my experience, it is rarely used, which is a ...
Soft Spots in Hardened Software Over the past decade, Microsoft, the target of choice for many online attackers, has hardened its operating system, adopting technologies designed to ...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*