SHARE



ABOUT THE AUTHOR


Matt Brunk
Matt Brunk has worked in past roles as director of IT for a multisite health care firm; president of Telecomworx,...
Read Full Bio >>
SHARE



Matt Brunk | February 02, 2009 |

 
   

Lost & Found: Another Security Nightmare

Lost & Found: Another Security Nightmare I could give up my iPhone and you could give up using USB memory sticks without encryption. How likely is that?

I could give up my iPhone and you could give up using USB memory sticks without encryption. How likely is that?

The presidential inauguration in D.C. left the METRO lost and found bulging with personal items: purses, luggage, clothing and electronics devices such as cell phones and PDAs. The local media folks are probably right that folks got caught up in the moment. For those not caught up in the excitement, Credant Technologies conducted a study last September among taxi drivers in London and New York, and found that over 12,500 handheld devices such as laptops, iPods and memory sticks are forgotten at the back of taxis every 6 months.Credant also noted that 9,000 USB sticks have been forgotten in people's pockets as they take their clothes to the local dry cleaners. Credant also warns the business community and individuals to be vigilant when traveling with their mobile devices, especially as many of these devices now have the capacity to store as much as 10,000 Word documents, 11,000 pictures, 500,000 contact details or an amazing 1.1 million emails, making them an obvious target for identity theft criminals and hackers who can steal this information and assume the identity of the user both in their personal or business life.

I admit I like traveling light and that means not dragging a laptop around. Seriously, if I lost my iPhone, there's only a 4-digit password preventing the finder from accessing what's stored in my iPhone: Remote Desktop to customer sites, contact and personal information. You can imagine what's found on USB memory sticks. Seemingly miniaturization, portability and mobility have made it easy for us to expose ourselves and companies. Managing endpoints includes things without a tether.

While my iPhone supports secure Remote Desktop, Cisco IPSec VPN and WPA2 Enterprise with 802.1X authentication, the only barrier to keeping these connections safe should I lose my iPhone is a feeble 4-digit password and a phone call to AT&T to disable the lost phone. Even with a disabled phone it won't take too long to gain access to the information stored within the iPhone. So securing and managing the endpoints is a good thing; it's hardly obtainable when the devices get lost and then found by someone other than the owner. Of course I could give up using the RDP feature on my iPhone and you could give up using USB memory sticks without encryption. How likely is that?I could give up my iPhone and you could give up using USB memory sticks without encryption. How likely is that?





COMMENTS



Enterprise Connect Orlando 2017
March 27-30 | Orlando, FL
Connect with the Entire Enterprise Communications & Collaboration Ecosystem


Stay Up-to-Date: Hear industry visionaries in Keynotes and General Sessions delivering the latest insight on UC, mobility, collaboration and cloud

Grow Your Network: Connect with the largest gathering of enterprise IT and business leaders and influencers

Learn From Industry Leaders: Attend a full range of Conference Sessions, Free Programs and Special Events

Evaluate All Your Options: Engage with 190+ of the leading equipment, software and service providers

Have Fun! Mingle with sponsors, exhibitors, attendees, guest speakers and industry players during evening receptions

Special Offer - Save $200 Off Advance Rates

Register now with code NOJITTEREB to save $200 Off Advance Rates or get a FREE Expo Pass!

April 5, 2017

Its no secret that the cloud offers significant benefits to enterprises - including cost reduction, scalability, higher efficiency, and more flexibility. If your phone system and contact center are

March 22, 2017

As today's competitive business environments push workforces into overdrive, many enterprises are seeking ways of streamlining workflows while optimizing productivity, business agility, and speed.

March 8, 2017

Enterprise IT's ability to innovate is critical to the success of the business -- 80% of CIOs agree. But the CIO role has never been more challenging than it is today, with rising operational respo

March 23, 2017
Tim Banting, of Current Analysis, gives us a peek into what the next three years will bring in advance of his Enterprise Connect session exploring the question: Will there be a new model for enterpris....
March 15, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, discusses the evolving role of the all-important session border controller.
March 9, 2017
Organizer Alan Quayle gives us the lowdown on programmable communications and all you need to know about participating in this pre-Enterprise Connect hackathon.
March 3, 2017
From protecting against new vulnerabilities to keeping security assessments up to date, security consultant Mark Collier shares tips on how best to protect your UC systems.
February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.