Mobile e-mail devices could pose threat to networks

Goodwin, Bill
September 2005
Computer Weekly;9/13/2005, p8
Trade Publication
The article reports that, according to the analyst Gartner Group Inc., large organisations are leaving their networks vulnerable to attack by failing to police unofficial use of mobile e-mail devices by their staff. Staff are often tempted to link their personal mobile devices to the work e-mail system, particularly when they see senior staff with Blackberries or similar devices. But this can create serious security holes in networks, which can allow hackers, viruses and other malware into corporate systems, said analyst Monica Basso. Some companies are so relaxed about their staff using personal devices to link to corporate e-mail that they allow them to redirect their corporate e-mail to public Internet sites and use their own devices to synchronise, she said. Gartner estimates that the number of mobile e-mail devices in use will grow from eight million to more than 80 million worldwide in the next three years, making wireless security a top priority for IT departments. Basso advised IT departments to make sure that data stored on wireless devices is encrypted, and to invest in systems that can remotely block access or wipe data if devices are lost.


Related Articles

  • Mobile Spies: wireless devices become hackers' tools of choice. Cortes, Rossie // Caribbean Business;10/7/2004, Vol. 32 Issue 42, p38 

    The article states that wireless devices may put users more in touch than they bargained for as hackers have found ways to use these same gadgets to steal private data. While it is relatively secure to transfer information through wires, mobile devices pose a security risk in that they can...

  • Mobiles Can't Ward Off Hackers, Gartner Reports.  // Electronic News;4/5/2004, Vol. 50 Issue 14, pN.PAG 

    Focuses on a report from Gartner Inc. which estimated the number of mobile devices that lack protection from hackers. Solution suggested to enterprises; Techniques to improve wireless security.

  • Small is All the Rage. Fisher, Dennis // Information Security;Nov2007, Vol. 10 Issue 10, p18 

    The article reports that after years of doing everything to build the largest botnets, computer hackers have begun downsizing their networks as a way to evade detection. The theory says that a botnet with hundreds of thousands of machines is easy to find and attack due to its size. According to...

  • It's not your site, it's programs that run your site. LeClair, Lee // Inside Tucson Business;4/17/2006, Vol. 15 Issue 45, p24 

    The article points out that computer security for businesses with working web sites is a continuing struggle that requires vigilance and care whether one is running PCs or servers. One must be careful as to how the web programs work when they communicate with customers. One should realize that...

  • Security a major concern for technology sector in 2004. Cortes, Rossie // Caribbean Business;12/30/2004, Vol. 32 Issue 54, p32 

    The article informs that security a major concern for technology sector in 2004. In an effort to take advantage of this increased demand for service, many companies such as Hewlett-Packard (HP), Microsoft, Oracle, and PeopleSoft have implemented outsourcing services, and established local...

  • Mobile Devices Vulnerable To Hackers.  // Business Communications Review;May2004, Vol. 34 Issue 5, p6 

    Reports that a research conducted by the Gartner Inc., has found out that vast majority of mobile communication devices lack protection against hackers.

  • '7 Steps' for network security. Ellis, Chris // Communications News;Feb2003, Vol. 40 Issue 2, p36 

    Provides strategies to ensure computer network security. Information on corporate network vulnerabilities such as hackers and data thieves; Details on auditing and testing network devices and servers; Advantages of a security policy.

  • PROTECTING INFORMATION. FRANK, KIMBERLY E.; CHARRON, DAVID // Strategic Finance;Jan2002, Vol. 83 Issue 7, p24 

    The article discusses how to prevent security breaches in corporate networks by means of laptop computers and other portable devices. A stolen laptop or cell phone presents unauthorized persons an opportunity to access a firm's data. Several protective measures can be implemented. Passwords...

  • IT directors urged to prepare for growing mobile demand. Hadfield, Will // Computer Weekly;8/2/2005, p6 

    This article reports that mobile workforces will become the top priority for businesses over the next three years. Speaking at a seminar about mobile applications, analyst firm Gartner Group Inc.'s research director Monica Basso said that the business case for mobile e-mail had already been...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics