Forgetful mobile devices for careless users

By
Page 1 of 3  |  Single page

“Blessed are the forgetful: for they shall have done with their stupidities too,” German philosopher Friedrich Nietzsche once wrote.

Forgetful mobile devices for careless users
The 19th Century philosophy seems to have struck a chord with modern day manufacturers, who tout mobile devices with remote memory erasure capabilities or that store no user data at all.

Securing mobile data has become an increasingly prevalent issue for businesses in recent times, as notebooks and smartphones gain ubiquity in the corporate world.

Employees who access corporate data remotely and out of office hours may threaten the security of sensitive information in cases of accidental loss or theft of their mobile devices.

IT contractor EDS recently was reported to have lost a portable hard drive containing data on as many as 1.7 million prospective U.K. armed forces recruits.

The incident follows the U.K. Ministry of Defence’s recent admissions to the loss of three hard drives containing details of more than 50,000 members of the Royal Air Force, and the loss of loss of 658 laptops and 121 USB data drives since 2004.

Other storage devices such as CDs and flash memory cards also have resulted in data leakage in the past.

Sensitive MI6 photos found their way to the public last month via a camera that was sold on eBay. Meanwhile, in March, HSBC lost a CD containing names, life insurance cover levels and dates of birth of 370000 of its customers, prompting industry criticisms of ‘basic stupidity’.

Microsoft has partnered with Nokia, Apple and Sony Ericsson to safeguard sensitive information through technology that wipes clean the memory of missing smartphones.

Dubbed Microsoft System Centre Mobile Device Manager 2008, the technology is a function of Windows Mobile 6.1, and allows system administrators to deliver a ‘kill command’ to a lost or stolen mobile device via Microsoft Exchange.

The kill command is executed as soon as the missing device is connected to a cellular or Internet-enabled network, after which a confirmation notice is delivered to the administrator.
Next Page 1 2 3 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Victoria's Secret pulls down website amid security incident

Victoria's Secret pulls down website amid security incident

Log In

  |  Forgot your password?