This resource is no longer available

Gone in a Flash

Cover
Did your business just walk out the door?

Our mobile workforce can steal or lose sensitive data quickly and without detection, from a software developer sneaking out gigabytes of valuable source code on his iPod to an executive's wireless-enabled laptop being sniffed at the local coffee shop.

Think about all the ways we move and store data on mobile devices: USB ports, which support a multitude of portable storage devices, including flash drives, portable hard drives, printers, and music and video players; FireWire, PCMCIA, serial and parallel ports, CDs/DVDs, tape drives and even the lowly floppy drive. Add unprotected WiFi, Bluetooth and Infrared (IrDA) connections, and you have a real security nightmare on your hands.

Author

Sandra Kay Miller Contributor, Information Security magazine Sandra Kay Miller is a technical editor for Information Security magazine with fifteen years of experience in developing and deploying leading edge technologies throughout the petroleum, manufacturing, luxury resort and software industries.
Vendor:
Information Security Magazine
Posted:
05 Mar 2007
Published
01 Mar 2007
Format:
HTML
Length:
8 Page(s)
Type:
Journal Article
Language:
English

This resource is no longer available.