• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Professional Security Officers, Security Guard Services

Professional Security Officers, Security Guard Services

Sunstates Security

  • OUR SERVICES
    • Security Personnel
    • Specialized Markets
  • OUR APPROACH
    • Employee Engagement
    • Management Engagement
    • Training and Safety
    • Quality Assurance
    • Strategic Partners
  • WHY SUNSTATES
    • Founding Principles
    • Executive Leadership
    • Testimonials
    • Gallery
  • RESOURCES
    • News
    • Newsletter Subscriptions
    • Tools
  • CAREERS
    • Selection Process
    • e-Learning: Your Career Path
    • Employee Benefits
    • Apply Online
  •  CONTACT 
  •  EMPLOYEE 

New Smart Phone Security Threats to Your Business

March 18, 2015

NEW SMARTPHONE SECURITY THREATS TO YOUR BUSINESS


Mobile phones have become as important to business function as email and paper. With the incorporation of high-level software functions like Microsoft Office, the functionality of these devices has reached unprecedented levels–and so has their vulnerability to a security compromise. A study by the Carnegie Mellon University revealed that 4 in 10 companies that issue mobile phones have had devices lost or stolen, many of which contain sensitive data.

In a highly publicized case in the United Kingdom, the mobile phones of celebrities and high-profile criminal victims were hacked by reporters, resulting in serious damage to criminal investigations and intrusions into the personal lives of unsuspecting people. The ongoing fallout has resulted in several prison sentences and the closure of one of Britain’s oldest newspapers, The News of the World.

Risks of Mobile Communication

Employees are accessing increasingly sensitive information via smartphones, which are slowly but surely replacing laptop computers for sensitive data transfer. The Carnegie Institute estimates that mobile data usage will increase twelve-fold by 2014. All this activity has attracted the hacking community and identity thieves. In 2010, threats from malware increased by an estimated 46%, which translates to 55,000 new malware threats each day. Worse still, when users sync their phones with their computers, malware can be transferred and propagated.

This situation is exacerbated by users accessing potentially sensitive data in public Wi-Fi locations, such as coffee shops, airports, bookstores or other locations providing free Internet access. These free services are designed for ease of use, not security. Educating end-users is essential in helping them understand the risks involved and teaching them how to avoid having sensitive data intercepted.

Device Disposal and Recycling

Organizations must be proactive and thorough when disposing of smartphones, because those devices still may have sensitive data stored in them. Such devices should be destroyed at the end of their service, with consideration to having the device and memory cards ground up to make it impossible to retrieve embedded data.

Older phones are often handed down to lower levels of management/workforce as newer faster ones are requested by senior management. In these cases, data and memory cards should be erased and/or replaced.

New Dangers and Responsibilities

Corporate espionage can easily target such versatile, powerful devices. To prevent security compromise, many companies restrict cell phone use. Others with sensitive R&D projects require employees and visitors to log phones in. Phones should be considered real threats to security and should be considered in any vulnerability assessment.

Issuing employees new technologies brings new responsibilities. Companies should also establish policies and procedures for how to handle, use, and recycle phones. Use of phone passwords is key, as well as the implementation of features that allow devices to be wiped remotely.

The Bottom Line

Mobile phones present a major challenge for professionals charged with maintaining security for any size of the organization. Too many phone users do not take the threat seriously and so leave themselves and the organization open to attack. The results can be compromising, at best, to catastrophic at worst.

Sunstates Security can help organizations with policy and protocol development and employee training. For more on this and other security-related information, please contact us.

Primary Sidebar


Categories

  • Awards
  • COVID-19
  • Security News
  • Sunstates News
  • Team
  • Uncategorized

Follow Us On Facebook

Footer

     

 

801 Corporate Center Drive
Suite 300
Raleigh, NC
27607
Toll Free: 866-710-2019

 

 
LICENSES:
CA - PPO120751,
VA-11-2948,
Texas B11167; A10515101; F01339
Illinois #122.001562
Nevada #3064

Copyright © 2023 · Sunstates Security All Rights Reserved · Privacy Statement · Disclaimer · Opt-Out Preferences

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}