SHARE



ABOUT THE AUTHOR


Eric Krapf
Eric Krapf is General Manager and Program Co-Chair for Enterprise Connect, the leading conference/exhibition and online events brand in the...
Read Full Bio >>
SHARE



Eric Krapf | April 10, 2012 |

 
   

FCC Steps Up Fight Against Mobile Device Theft

FCC Steps Up Fight Against Mobile Device Theft The commission cites alarming statistics as it announces a cooperative program with the cellular carriers. It can only help enterprises get a handle on BYOD.

The commission cites alarming statistics as it announces a cooperative program with the cellular carriers. It can only help enterprises get a handle on BYOD.

Security concerns top the list of enterprise managers' concerns over BYOD (bring your own device), so this week's FCC announcement of new steps against mobile phone theft is welcome news. Many of the specifics are measures that enterprise communications managers have already been talking about quite a bit, but the additional focus can only help.

And the FCC cites some pretty alarming statistics:

More than 40% of all robberies in New York City involve smartphones and other cell phones.

The situation is getting worse: In Washington, D.C., cell phones were taken in 54% more robberies in 2011 than in 2007, and cell phones are now taken in 38% of all DC robberies.

Other major cities have similar statistics, with robberies involving cell phones comprising 30-40% of all robberies.

The FCC has secured the cooperation of AT&T, Verizon, Sprint and T-Mobile in its initiative, so this is basically an industry-wide effort.

The most significant new development in the FCC's effort is a commitment from the participating carriers that they'll block all access to any device that's reported stolen, and a common database across the carriers will be implemented to support this effort. The initiative also will include public education campaigns around ways to avoid mobile device theft and applications that are available for locking, locating and wiping devices.

Given the rapid spread of BYOD across enterprises, you'd have to hope that companies are doing their own education campaigns to impress upon users the importance of security. And the kinds of remote-wipe applications mentioned by the FCC should be already under consideration by enterprise managers.

The best news may simply be that this is more evidence that the workplace and the general public are internalizing the idea of BYOD (also see Building BYOD-Ready Networks), and are adapting to the new reality.





COMMENTS



Enterprise Connect Orlando 2017
March 27-30 | Orlando, FL
Connect with the Entire Enterprise Communications & Collaboration Ecosystem


Stay Up-to-Date: Hear industry visionaries in Keynotes and General Sessions delivering the latest insight on UC, mobility, collaboration and cloud

Grow Your Network: Connect with the largest gathering of enterprise IT and business leaders and influencers

Learn From Industry Leaders: Attend a full range of Conference Sessions, Free Programs and Special Events

Evaluate All Your Options: Engage with 190+ of the leading equipment, software and service providers

Have Fun! Mingle with sponsors, exhibitors, attendees, guest speakers and industry players during evening receptions

Special Offer - Save $200 Off Advance Rates

Register now with code NOJITTEREB to save $200 Off Advance Rates or get a FREE Expo Pass!

March 8, 2017

Enterprise IT's ability to innovate is critical to the success of the business -- 80% of CIOs agree. But the CIO role has never been more challenging than it is today, with rising operational respo

February 22, 2017

Sick of video call technology that make participants look like they're in the witness protection program? Turns out youre not alone. Poor-quality video solutions can give users an unprofessional ap

February 7, 2017

Securing voice communications used to be very simple since it was generally a closed system. However, with unified communications (UC) you no longer have the walled protection offered by a dedicate

February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.