Vocatys - Mobile Strategy Leaders
  • Home
  • Services
  • Case Studies
  • Contact
  • Blog

Should You Use Your Mobile for Work?

21/2/2014

1 Comment

 
Mobile Security for Small Business
Do you have a passlock, PIN or password on your smartphone?

Yes – Please continue reading

No – Set One Up Right Now! Then please continue reading.

Now with a proper lock on your phone, do you think your phone and all the information (emails, passwords, photos, banking details etc.) in it is safe?

It doesn’t matter what your answer is I suggest you keep reading.

For a long time now mobile strategy experts, users and I’m sure a great number of conspiracy theorists have been suspicious about the security on our mobile phones. A few days ago I came across an article referring to a series of posts from Latanya Sweeney, Chief of Technology at the US Federal Trade Commission. She goes into great technical detail on how your smartphones become a fantastic tracking device for anyone interested. She also talks about how retailers are already using such technologies to better target consumers.

Quite simply put, our phones are constantly communicating with mobile towers, Bluetooth devices, WiFi networks and when they are not connected, they are continuously seeking one. This constant communication is sent out as signals, with unique identifying details like MAC Addresses that are not secured or adequately encrypted. This lack of security is exploited by a number of commercially available devices that are very easy to use, portable and come with an impressive list of features. These devices can capture your location data, intercept calls, access SMS data, emails, photo galleries and app data (banking, messaging, games etc.). They are undetectable and capture up to 20 mobiles per setup and have a very large range.

From an individual user’s point of view this is certainly concerning but it is a calculated risk we are willing to take in lieu of substantial conveniences.

From an organisation’s point of view, however, these laptop-sized devices can be set up almost anywhere. They do not need to be inside an office to be able to capture data from the phones used in that company. Now this becomes a risk an organisation cannot afford to take.

Without a robust mobile strategy in place, using your smartphone to do any work is like playing Russian roulette with yourself.

If you think this post was useful, please feel free to forward it along. On the other hand if you thought this was rubbish, make sure to give us a piece of your mind.
1 Comment
Bake N Rolls link
25/10/2023 04:20:44 pm

Lovely blog, thanks for taking the time to share this.

Reply



Leave a Reply.

    Author

    The Vocatys Team writing on Breaking News on Emerging Technology, How-To's, Why-To's, Company News and some seriously mundane ramblings!


    Archives

    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014


    Categories

    All
    Apps
    Bitcoin
    Breakup
    BYOD
    Cloud Strategy
    Data Analytics
    DeCent IT
    DeCent-IT
    GoT
    Heartbleed
    Internet Security
    IoT
    IT Support
    MH370
    Mobile Hijack
    Mobile Security
    Mobile Strategy
    Responsive Design
    RiskEverything
    SMB
    Social Media
    Video


    RSS Feed

What We do

DeCent-IT Framework
Mobile Strategy Consulting
Business IT Support
Apps & Websites

Company

About Us
Careers
Contact
Legal

what Our clients say

"Vocatys is the game changer that IT support companies don’t want you to know about."

- Director, Liquid Learning Group
© 2016 Vocatys Pty Ltd  |  44 Market St Sydney Australia