Unlike many of the questions answered in this blog, this week’s question is not one I get asked often. In fact, many people think, ‘Why do I need to worry about the security of my mobile phone? It’s just a phone, right?’
Wrong.
These days, the average mobile phone is actually a small computer, with more computing power than the early mainframes that took up massive rooms just to compute ballistic trajectories. Today, ‘Paper Toss’ on an iPhone does that with full graphics and a crosswind calculation as well.
In today’s fast-paced environment, our phones contain an infinite wealth of information, starting with – but not limited to – contact details for your family, friends, clients and prospects.
The consequences of losing your phone or having it stolen could be disastrous. And with approximately 4,000 mobile phones lost or stolen EVERY WEEK in Australia, that’s more likely to happen to you than you may think.
Leaving an unsecured mobile phone in a taxi, shop or bar, could lead to any number of scenarios as a result of identity theft. Having a phone stolen from an unwatched bag or car is always going to be a pain – but losing data as well only adds insult to injury.
Let’s come at it from another angle. If you run a business and let your staff connect to your computer systems with their phones, how do you know what information they take home with them when they walk out the door each night? What documented policies do you have around the use of mobile phones for this purpose? What computer-based software enforced policies are in place?
In many cases, people simply don’t know that this kind of technology is available. Did you know, for instance, that in Windows Small Business server 2008, you can force auto locking of phones so a pin is required to access the phone? Is that enforced in your business?
There are also applications that allow computer administrators to wipe a lost or stolen Windows Mobile, iPhone or Blackberry. Are you set up to activate such an application? Do you even have a plan to activate when a phone is reported lost or stolen?
There is also software for phones that have a built-in GPS that lets you track where your phone has gone. This is a small investment that may save you a phone replacement, and a lot of grief. Of course, if you live in a mansion it may also help you to determine which room you left the phone in with the ringer on silent!
I can promise you that each of your staff will complain about the pin being enforced, and will want it removed. You won’t enjoy it yourself; but when the next phone goes missing, and you know it can’t be accessed or used by the person who finds it, you will appreciate that extra bit of security you put in place.
Of course, the security is not completely robust. Like all security systems, there is a way around it or through it, but it is still far better than nothing. You can always add extra security with stronger passwords and encryption, but for the small business market just setting up the basics is usually a big step in the right direction.
In today’s world of ubiquitous data, we all need to be aware of the data we hold in our hands, and the importance of securing that data. It is absolutely my recommendation that you take proactive steps to ensure that security, and resist the temptation to be lazy and leave yourself open to risk.
Click here to read more IT Systems expert advice.