Mobile Technology Essays
Vulnerabilities due to the introduction of mobile devices and wireless networking are a real threat for numerous reasons. Mobile devices that do not have passwords enabled or require two-way authentication leaves data stored on the device vulnerable to unauthorized access should the device be lost or stolen. Remotely disabling a device should it become lost or stolen can alleviate this vulnerability. Also, once a mobile device is in an employee’s possession, the employee tends to treat the device as his personal device and may download unauthorized software or applications. Because the device does not come with preinstalled security software, there is no mechanism to determine if malware is being download with a free application. Free does not equate safe.
In the overall realm of IT, the biggest threat to any company or organization may not be from an outside source but from within. Whether it is intentional or unintentional employees are truly the biggest security risk. Whether it is innocently clicking on a link in an email or divulging personal identifiable information, employees must be made aware of their role and responsibility in IT security. For this reason alone it is essential that companies/organizations