8/2/2023 0 Comments Macroplant phonediskAny stolen phone could have full email and text message access, which in most environments would mean full access as that user. THIS IS KEY, you need to have a number you can point at and say "This is how much it will cost you to not do these things." You then correlate this stolen laptop number to a phone that is lost or stolen. Find some statistics on stolen laptops, and how much they cost the business. If you either don't want to take this route, or don't feel confident in it, just pull out some statistics. You would have to make sure to really involve the group, and a "Hell no, you're not reading my emails" has to be the response to your request, or it won't go anywhere. Presentation and involvement are key to this going over well. Remote wipe capabilities are needed because otherwise its only a matter of time until a stolen phone has its security cracked, and all the data let loose. Tell them you are going to go through and read all of their emails and text messages aloud.Įxplain that without having a secure password on the phone, any phone left in a restaurant, or left unattended on a table is vulnerable to this. If you want to go sensationalist, there's the easy route: stand up in front of them, ask either the highest ranking or the most security conscious to see their phone. Well, you could do anything that a normal user of the phone could do, including accessing all of the information that the person would have access to, impersonating the person to either internal staff or people outside of the company (which could ruin the reputation of the company), etc. Smart phones are a new (fun) target to attack, especially as client side vulnerabilities have become such a large vector of attack.Īs for what can be done with an unprotected phone. we need to make sure that in the case that we don't have full disk encryption on our smart phones that we can at least prevent most people from accessing it using passwords and to give us time to remotely wipe the device. It's much easier to leave a phone in a taxi, airport, hotel, starbucks, etc. We take extreme measures to protect our PC's because they have access to sensitive information such as e-mail, we should be taking measures to protect that sensitive information on all of our devices.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |