iTnews
  • Home
  • News
  • Technology
  • Security

Mobile storage devices a threat to business

By René Millman on Aug 3, 2006 2:19PM

Businesses are at risk of data loss and theft because of bad management of mobile storage devices within organizations.

A new survey found that 61.5 percent of memory stick owners use their devices to transfer data to their PC; 53 percent to their laptop; 5 percent to their games console; 5 percent to their MP3 players and 2.6 percent to their Smartphone or Blackberry.

The Mobile Access study, carried out by the Social Futures Observatory investigated attitudes towards portable media and storage devices, which are proving increasingly difficult to manage.

According to study the statistics, show that memory sticks are becoming increasingly important, providing individuals with flexibility over where and how they work in addition to reducing overhead and personal equipment costs, such as personal printers.

"The growing transformations in the market for highly portable devices, where they facilitate the rapid transfer of data, raises serious questions about the opportunities for the liberation of corporate data, the potential for the transfer of destructive viruses and the serious threat of identity fraud following the loss of theft of such devices carrying personal details," said professor Michael Hulme, director of the Centre for the Study of Media, Technology and Changes.

Because the primary function of devices such as digital cameras, MP3 players and mobile phones, is not likely to be data storage, the unintentional release of data upon sale or loss of such equipment, is not being considered by users.

"With the cost of these removable media devices being constantly driven down individuals are failing to make the connection between the value of the data stored on such devices and the level of care that needs to be taken to secure it," said Neil Larkins, director of Reflex Magnetics, the company that commissioned the study. "The study highlights the need for an education process, to ensure these businesses and end-users understand that devices should be properly managed and that full consideration is given to the effect of the loss or theft of the data."

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
abusinessdevicesmobilesecuritystoragethreatto

Partner Content

Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By René Millman
Aug 3 2006
2:19PM
0 Comments

Related Articles

  • Oracle accredited 'certified strategic' gov cloud provider
  • Password vulnerability fixed in Dell storage firmware
  • ACMA clamps down on SIM-swap frauds
  • Public sector data sharing laws pass parliament with Labor changes
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Researchers hacked Oracle servers to demo serious vulnerability

Researchers hacked Oracle servers to demo serious vulnerability

PayTo rollout kicks off

PayTo rollout kicks off

Australian scientists build world's first quantum computer IC

Australian scientists build world's first quantum computer IC

Digital Nation

Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
The security threat of quantum computing
The security threat of quantum computing
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.