Gone in a Flash
Did your business just walk out the door?
Our mobile workforce can steal or lose sensitive data quickly and without detection, from a software developer sneaking out gigabytes of valuable source code on his iPod to an executive's wireless-enabled laptop being sniffed at the local coffee shop.
Think about all the ways we move and store data on mobile devices: USB ports, which support a multitude of portable storage devices, including flash drives, portable hard drives, printers, and music and video players; FireWire, PCMCIA, serial and parallel ports, CDs/DVDs, tape drives and even the lowly floppy drive. Add unprotected WiFi, Bluetooth and Infrared (IrDA) connections, and you have a real security nightmare on your hands.
Sandra Kay Miller
Contributor, Information Security magazine
Sandra Kay Miller is a technical editor for Information Security magazine with fifteen years of experience in developing and deploying leading edge technologies throughout the petroleum, manufacturing, luxury resort and software industries.
- Information Security Magazine
- 05 Mar 2007
- 01 Mar 2007
- 8 Page(s)
- Journal Article