Securing Your Smartphone or PDA Smartphones and personal digital assistants (PDAs) have become important business tools in recent years, and that trend appears to be continuing. According to Gartner Inc, worldwide PDA shipments in the first quarter of 2006 increased 6.6 percent compared to the first quarter of 2005. While use of these handheld devices is becoming more widespread, prices have remained steady, with the average price per device dropping 2.7 percent compared to the same time last year. For purposes of clarification, Gartner defines a PDA as a data-centric handheld computer weighing less than one pound that is primarily designed for use with both hands. Smartphones offer all the attributes of a PDA, except that smartphones are voice-centric and are designed for primarily one-handed operation. Those differences aside, both devices offer the freedom of mobility to continue business operations outside the physical office walls, enabling anywhere/anytime communication via the phone, email, or Internet using a wireless connection. If you are already using, or thinking about using, smartphones or PDAs in your small business, security must be a priority. Many people are unaware that these devices are highly vulnerable to information theft and online security threats; in fact, they require the same security precautions of a laptop connected to a wireless business network. Very few wireless devices come equipped with the right security features out of the box, so it is vital that you take some proactive security measures. Information at risk The reality is that all customer details, financial records, and business emails stored on a handheld device is vulnerable to corruption or theft, potentially damaging your business operations and reputation. In addition, malicious codes received on a handheld device could enter your business network during synchronization, causing a massive network infection. Also, it is common to store valuable personal information like PIN numbers, passwords, bank account details, credit card or social security numbers on your handheld device, making you a prime target for identity theft. In addition to online theft and infection, a prominent security risk is the physical loss of the actual devices. The portability of these devices makes them easier to lose – and the monetary value of the devices (not to mention the data that they hold) makes them a popular target for thieves. Security Tips
Conclusion from Symantec |
UPCOMING VIRTUAL EVENTS
Demystifying Cyber Security for SMBs
The continually changing threat landscape requires us to update best practices and add new concepts to keep your organization safe.
SESSION 4: Cyber Security Strategy
Watch On-Demand
SESSION 5: Cyber Insurance & MFA
Watch On-Demand
SESSION 6: Threat Detection | JAN. 15
Microsoft Copilot
Master Class Workshop
eMazzanti will host 60-minute Master Classes, that speak to how AI can help your business streamline and grow.
In each session, you will have Artificial Intelligence and Automation explained, view a live demo of Copilot, and see it live in action in a dynamic format.
RESOURCES
Cyber Security Awareness Hub
Cyber Security Awareness Kit, designed to be delivered to your team in bitesize chunks.
We are sharing the resources and highlighting services your organization needs, covering everything from multifactor authentication to software updates, showing your users just how easy it is to improve their security posture.
Resource Library
Insights to help you do what you do better, faster and more profitably.
> Tips to Stay Protected Against Phishing Attacks
> Understanding Ransomware
> The 6 Known Wi-Fi Threat Categories Targeting Your Business and How to Defend Against Them
> Practical Advice for Avoiding Phishing Emails
NEWSLETTER
"*" indicates required fields