Having smart phone stolen or losing it will constitute severe security threats because some IT experts have discovered that security police will not work when they are dealing with multiple smart phone platforms. Moreover, terminal users will not be able to resist their desire of connecting to the network of the company via only one device.
It is revealed by the research crew targeting at the security study of smart phones in Carnegie Mellon University that four out of ten companies have had their mobile devices stolen. About a half of the stolen and lost devices contain key business statistics of the companies.
This research has detected that more than one third of the stolen mobile devices have imposed economic influence on these companies. The shadow casted by the risk of missing or stolen devices is more serious than the threats directed toward the mobile platform by the malware. Although it is predicted that the stolen mobile devices will increase the number of attacks imposed on cell phone platforms, up till so far, the attacks are limited to an extremely small number. The damage done to the cell phone by malware is limited because of the frequent adoption of malware scanning approaches. On the contrary, losing the mobile devices will leak more important information of the users.
The terminal users are currently adopting some new security measures to locate their devices. The research has also found that less than 50 percent of the equipment users have the habit of backing up their mobile statistics in every week. Nearly 50 percent of users set password on their mobile devices. In addition, another one out of three users sets sensitive working related information on their smart phones.
Companies have developed corresponding security policies toward mobile devices. However, the study has discovered that less than one third of employees understand the security policy of the smart phone in their company. A majority of employees do not know the access privileges of their devices and all they know is that the policy of their companies appears to be too strict. This means that these companies are currently stuck in a difficult situation and they are requested to achieve appropriate balance without affecting the productivity.
The report believes that the users should understand what the security policy of their company is, why they should be feasible. The users have to realize that they are the information managers of their companies and their lives are dependent on maintaining information security.disk optimizers.
No comments:
Post a Comment