SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Dell Technologies Inc. -- Ignore unavailable to you. Want to Upgrade?


To: stockman_scott who wrote (165741)6/7/2001 3:38:58 PM
From: D.J.Smyth  Read Replies (2) | Respond to of 176387
 
The Mobile Workforce - The Weakest Link

6/6/2001

The use of handheld computers is estimated to grow by more than 50 percent in the next few years. The Gartner Group forecasts that more than one billion handheld computers and mobile telephones with wireless network connectivity will be in use globally by 2003. This surge in use of mobile devices means that companies need to make sure their growing mobile workforce use devices that are secure so that handhelds do not become the weakest link in their security system. Analysis by Magnus Ahlberg, MD of Pointsec Technologies Ltd

More people are working "on-the-move" using powerful laptops and handhelds to store increasing amounts of valuable and confidential data which if lost or stolen can put a company at serious risk of sabotage, exploitation or damage to their professional integrity. Take the case last year of the jet fighter who lost his laptop allegedly containing 100's of unencrypted top secret diagrams. It was brought to the world's attention when a national newspaper handed the laptop back to an embarrassed MOD representative. This case highlights the importance of securing information held on mobile devices if it is of a sensitive or confidential nature.

The internet has revolutionised the way we all do business, enabling us to have up to the minute information at our fingertips 24 hours a day, putting traditional methods of communicating and trading behind us forever. In order to be efficient, companies have to use mobile devices such as laptops, notebooks, handhelds or WAP phones. However, passing confidential client information or carrying out transactions of any kind over the internet has considerable security implications and legal ramifications, which must be considered by professionals if they are to survive in a competitive world.

Palm pilots currently have a memory capacity of 8 Mb (soon to reach 128Mb in size), which is sufficient to store 10,000 personal or company addresses, 400 e-mail messages and 3000 documents with notes. A handheld computer with this sort of power containing so much information is easy to use away from the office – and just as easy to lose or steal! The fact they are so low in price and simple to "start-up" and use, makes them appealing to buy privately and use for company business. If handheld computers become as popular as mobile phones, the amount of thefts could be astronomic, according to The Federation of Communication Services over 15,000 mobile phones are stolen every month in the UK alone.

The increase in the number of handheld computers that are lost is directly relative to the increase in their use. Figures published by IDC predict that the global handheld market will explode in the next three years, from 12.9 million units in 2000 to over 63.4 million by 2004. As sales of handhelds increase, so do the number of connections to corporate networks posing a potential security breach.

Companies spend billions of pounds a year on IT security systems for desktop computers, however very little is invested in securing the mobile workforce. Most companies should have this area covered within their security policy - however in reality, very few have the necessary security solutions to ensure they are fully protected against breaches. According to the DTI Information Security Breaches Survey, 60% of organisations have suffered a security breach in the last 2 years and only one in seven organisations have a formal management security policy in place. Only 37% of organisations have undertaken a risk assessment where a systematic approach is taken to assess the security risks faced by the organisation.

Even when PDA and laptops do have a security device automatically installed users often try to circumvent them due to the time and "hassle" factor associated with using them. Once turned off, these devices become 'easy pickings' for anyone to get at confidential information or even use a stolen handheld to get through the corporate firewall and into the main corporate network. So what can be done to secure the mobile workforce?

8 STEPS TO SECURING YOUR HANDHELD

A workable security policy needs to be put into place with the most important factor being to communicate the policy to the workforce. Staff must be told about the security implications of mobile devices, and told what action will be taken if employees ignore this policy.

Fast and easy to use access control systems and encryption devices should be put in place on all mobile devices, which cannot be circumvented by the user.

Use dynamic passwords or certificates for secure remote access.

An audit needs to be carried out to find out who in the company is using a mobile device and whether it is owned by the company or the employee.

Staff should not be allowed to use their own mobile devices to store customer and company information on them, unless they have been installed with the company security system.

Use a security product that is compatible with all mobile devices and software versions, which can be managed centrally.

Avoid using products that leave the user to make security decisions - users will ignore or find a way around the system.

Make sure that if handhelds are used, that they are protected with up to date software, which can defend against known security loopholes.

There are currently very few security devices available for handhelds and WAP phones as companies are only just now beginning to recognise the need for secure devices for their mobile workers. However last month Pointsec Mobile Technologies Ltd introduced Pointsec for Palm OS an access control and encryption product for mobile devices. It now means organisations can have one security system which protects a range of handheld computers, laptops and PC's from unauthorised users. It allows user access to the computer after entering the correct password and can offer further protection by encrypting data as and when it is needed. This recent introduction of a security solution for laptops and PDA's will put an end to embarrassing and potentially damaging leaks of information from wireless devices used by the mobile workforce.