Get with the Curve: Time to Secure Mobile Devices

Blitz, Thomas
May 2006
Bank Technology News;May2006, Vol. 19 Issue 5, p48
Trade Publication
The article suggests the proper ways of protecting stored data on mobile devices such as notebook and personal computers. The types of risks which dictate the need for financial organizations to protect their data are presented, such as the obvious risk of financial loss through fraud or destruction of data, the loss of confidence by customers, partners and investors. For the security of their data, regulatory compliance is suggested.


Related Articles

  • Don't Be Out'smart'ed. Panettieri, Joseph C. // T H E Journal;Feb2006, Vol. 33 Issue 7, p18 

    The article discusses the threats posed by smart mobile phones to data security. More than 100 viruses now target smart phones running mobile operating systems from several high technology companies including Microsoft Corp. Consider the Cabir worm, which targets mobile phones running Symbian OS...

  • Protect mobile device data.  // Communications News;Oct2003, Vol. 40 Issue 10, p6 

    Stresses the importance of protecting mobile device data. Incidence in which a company gains a vested interest in protecting mobile device data; Steps to take when a device is lost or stolen; Benefits from device-management solutions.

  • Trojan hits Windows PDAs for first time. Bedbarz, Ann // Network World;8/9/2004, Vol. 21 Issue 32, p1 

    After finding the third malicious program targeting wireless devices in fewer than 60 days, security specialists are warning that it is only a matter of time before attackers will launch a serious attack against mobile telephones and personal digital assistants (PDA). Malicious programs...

  • An Unsecured Mobile Device Could Spy On Us, Steal Money from Us. Kadam, Avinash W. // PC Quest;Aug2013, p38 

    The article focuses on the adverse impact of an unsecured mobile device on businesses. It reveals that unsecured mobile device can be used as a rogue device that can spy individuals as well as steal money and information from firms. It highlights several levels when securing mobile devices...

  • FIVE TO WATCH AS BASELINE TURNS 5. Vizard, Michael // Baseline;Oct2006, Issue 64, p32 

    The article outlines the five key emerging technologies that could lead to an increase in productivity by 2011. Included in the major emerging technologies is multicore processors. They offer a vast prospect in terms of visualization on personal computers. The development of proactive security...

  • Look behind the firewall. Okin, Stuart // SC Magazine: For IT Security Professionals (UK Edition);Feb2006, p23 

    The article presents the author's views on information privacy. The author comments that information privacy can be critical as far as business is concerned. Whether it is a legal document, a design for a new prototype or a bid for a contract, disclosing information to the wrong person can cause...

  • Mobile security: an update. Munro, Ken // SC Magazine: For IT Security Professionals (UK Edition);Jul/Aug2012, p17 

    In this article, the author claims that new attack vectors and vulnerabilities are matching the progress in mobile device management (MDM) offerings. The author reveals that his concerns about simple man-in-middle attacks over Wifi have been partly resolved and lauds as well MDM products for its...

  • MAKING MOBILES SAFE. Bradbury, Danny // Computer Weekly;9/14/2004, p60 

    This article suggests how the IT industry is developing protection to shield users from mobile attacks. Mosquito was one of the first serious attacks that has been seen on mobile phones in the wild, but there are others. Companies such as F-Secure provide antivirus products both for the mobile...

  • Targeting Privacy and Security. Berg, Andrew // Wireless Week;May2012, Vol. 19 Issue 1, p6 

    The article discusses mobile device privacy and security which reportedly has a potential for serious abuse. It explores the role of the U.S. government to regulate the release and use of information and prompt companies to consider how their technologies will affect end users. It tackles the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics