touch Mobile Safety and Medical Alarm GPS Phone
It is exactly
like having a full-time Personal Executive
Assistant in your pocket or purse - standing by
to help you anytime, anywhere!
amazing new SafeGuardian™ One Touch Mobile
Safety GPS Phone. For the first time, you can
call and speak with a live Personal Assistant
simply by pressing the "Call" button.
more visit www.safeguardian.com
with mobile security threats
though the IT industry buzzes with talk of the wonders
of wireless, mobile computing isn't going to replace
the corporate desktop anytime soon. However, that
doesn't mean your organisation shouldn't start
preparing to embrace elements of wireless technology.
are among the hottest and most requested services
among busy executives. While these devices can help
boost productivity, they also introduce a significant
— but manageable — risk to the security of any
most common PDAs run Palm OS, Microsoft Windows CE,
and Java-compatible platforms. But unlike earlier PDAs,
these devices do more than just take notes; they also
provide wireless links to office email and file
servers, making your corporate data all the more
many organisations overlook this growing
vulnerability. It's important to be aware that
attackers have written and deployed several hacks and
viruses to take advantage of the general lack of
security measures implemented during the deployment of
these devices. Let's look at how your organisation can
lock down its mobile devices against would-be
it comes to mobile security, perhaps the most
important security measure you can apply is common
business sense. Start by asking this question:
"Is there a business justification tied to the
deployment of these PDAs?"
no one can present a true business justification, then
there should be no IT support for such devices. You
should then treat these PDAs as unauthorised devices
and take steps to prevent users from installing these
rogue devices on the network.
course, there may be a strong business justification
for allowing PDAs on your network. If so, your next
step is to implement additional security measures to
help protect these mobile devices. On the next page we
look at some of your best bets.