Tag Archive for Blackberry

Better Mobile Security

Better Mobile SecuritySmartphone users should be concerned about mobile security. This is more true if the mobile device is used for work and has your employer’s email or messaging server. IT staff can take steps to protect the data on the mobile. Eric Geier, the founder of NoWiresSecurity writes provided CIO Update with 6 tips for better mobile device security.

Choose encryption and use itTip No. 1 – Choose a mobile OS that supports encryption and use it: Mr. Greer says to make sure the mobile operating system (OS) and device support hardware-based encryption. The article says Apple’s (AAPL) iOS and Research In Motion’s (RIMM) BlackBerry support encryption for both internal and external storage. Without encryption, it’s possible that someone could recover the data on the device even without your lock PIN or password.

Full device encryption is limited and varies on current Android device manufactures. Mr. Greer writes that Motorola Mobility’s (MSI) business-oriented smartphones offer encryption capabilities on Android 2.3. Android 3.x includes an API to help developers offer encryption on tablets. Android 4.x tablets and smartphones should support encryption sometime in 2012. WhisperCore is a third-party encryption solution that is in beta for Nexus S and Nexus One.

Set a lock PIN or password:Tip No. 2 – Set a lock PIN or password: The article says that enabling a password, whether it’s called a PIN, passcode, or passphrase, is the first line of defense in maintaining privacy and security. It helps prevent others from picking up your phone or device and snooping around if it becomes lost, stolen, or just left unattended. It’s also usually required if encryption is enabled on the device writes the author. A PIN will protect data and privacy from causal snoopers.

Tip No. 3 – Enable auto-wiping of data: Most mobile OSes support automatic wiping of the device’s data after a certain number of incorrect passwords attempts. Mr. Greer says auto-wiping is natively supported by iOS, Windows Phone 7, and BlackBerry. Android requires a third-party app, such as Autowipe.

It is important to keep all your data regularly backed up so the data can be restored to a new mobile after it is wiped.

Setup remote trackingTip No. 4 – Setup remote tracking and management: Before your phone or device gets misplaced or stolen the blog recommends that a remote tracking and management system should be set up. Most let you see the device’s GPS location on a map, send audible alerts to help you find it, and display a visual message to tell others how to return it. They typically also let you remotely lock and/or wipe it before someone else gets their hands on it. According to Mr. Greer:

  • For iOS 4.2 or later, Apple provides a free service.
  • For earlier iOS versions there’s the MobileMe service from Apple at $99 a year after the 60-day free trial.
  • For Android, you have to use a third-party app.
  • For Windows Phone 7 Microsoft provides the free Windows Live for Mobile service.
  • For BlackBerry, RIM provides the free BlackBerry Protect service.

Limit Wi-Fi hotspot usageTip No. 5 – Limit Wi-Fi hotspot usage: When you use public Wi-Fi hotspots that aren’t encrypted, all your Internet traffic is transmitted through the air and can be easily intercepted. The most important sites and services, such as banking websites, usually implement their own (HTTPS/SSL) encryption that protects their individual traffic. But most email providers and many social networking sites don’t; thus eavesdroppers can likely capture their passwords and traffic.

On the other hand, most 3G, 4G, and other cellular data connections are usually encrypted by the carriers. Plus eavesdropping on these types of connections isn’t as popular. Therefore, when you’re out and about you should try to use the data connection rather than unsecured Wi-Fi hotspots.

If you insist on using Wi-Fi hotspots, use those that offer enterprise encryption and 802.1X authentication, such as from T-Mobile and iBahn. Alternatively, consider using a VPN connection to secure your traffic from local eavesdroppers.

Use an antivirus or security app:Tip No. 6 – Use an antivirus or security app: Viruses, malware, and hacking on mobile devices is a growing problem. The author recommends installing a security app to help prevent infections and intrusions. Most AV solutions also offer other features, such as remote wiping, backup, and locating.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Security Tips

Tablet Security Tips ICSA Labs, an independent division of Verizon has provided third-party testing and certification of security products since 1989. They suggest a series of security tips for smartphone, tablet, or app user’s Help Net Security reports.

Only buy apps from recognized app stores

App storeApps from unofficial third-party stores and applications downloaded from peer-to-peer sites are much more likely to contain malware than apps sanctioned by official vendor stores such as the Android App Market or Apple App Store.

Think twice about accepting permissions

Most applications, legitimate as well as malicious ones, need users to accept several “permissions” before the apps are installed. Check carefully to be sure that the app comes from a legitimate source. I wrote about mobile phones leaking data previously.

Monitor bills for irregular charges.

Monitor billsIf attackers gain access to personal information stored on the mobile device, they can quickly rack up charges by sending “silent” text messages to high-priced call services. For example, if the Google (GOOG) Android Trojan GGTracker is inadvertently installed on a device, it can sign up users, without their knowledge, for premium text messaging services.

Employ security policies to protect employer-issued devices

Employers should enforce password-based access and require voice mail codes so that only authorized users can get access to data on employer-issued devices.

Be mindful of more personal devices at work

more personal devices at workCompanies must have security systems and policies in place to safeguard their business environment and prevent access to company networks from employees’ personal devices. I wrote about BYOT here.

Remember that a tablet is a tiny PCs

Many security threats that apply to traditional computers also apply to mobile devices, such as smartphones and tablets, and consumers should take necessary measures to protect themselves. One way to do this is to install anti-malware software on mobile devices and enable VPN functionality.

Protect your tablet, smartphone, and voicemail PIN

Protect your tablet, smartphone, and voicemail PINIf your mobile phone does not have a password, add one that is at least six digits. Try to choose a unique password that is not already used across other systems and accounts. Do not use repeating digits in passwords or voice mail pins. Remember that your provider will never request your voice mail pin, so do not be tempted to give it to anyone who requests it.

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Most Firms Don’t Know Why They Use the iPad

Most Firms Don't Know Why They Use the iPadDespite the widespread success of the Apple (AAPL) iPad more than half of companies lack a clear iPad tablet strategy according to a recent survey by Dimensional Research. CNET’s Stephen Shankland points out the survey which found that “Most participants, 51 percent, indicated that they did not have a clearly articulated strategy.

iPadThe survey of 448 businesses found that:

  • 22% have already deployed tablets.
  • 22% plan to do so this year
  • 24% plan to next year
  • 20% have no plans to deploy tablets

Dimensional Research polled the firms on whose tablet they intend to deploy and found:

Ann All at ITBusinessEdge.com says the survey is an affirmation that the BYOT (Bring Your Own Technology) trend is not hype, 41% of survey respondents said individual employees were using tablets they had purchased themselves.

The research firm also found that 82% of firms will use tablets to complement, and not replace, laptops. This fact is not lost on IT Pros. 42% of IT staff said business stakeholders do not understand the need for more development like new front pages specifically for the iPad.

Many of the companies I’ve spoken with seem to discover multiple use cases they hadn’t imagined for tablets when they begin putting them into users’ hands. And new applications continue to emerge all the time.

What do you think?

What tablet has your firm deployed?

View Results

Loading ... Loading ...
Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

iPad Users Likely to Transfer Sensitive Data

iPad Users Likely to Transfer Sensitive Data

Tablets, mostly Apple (AAPL) iPad is organizations into the consumerization of IT.  Tablets are forcing IT managers to accept the idea of supporting employee-owned devices. Many organizations are struggling with how to secure the data on these consumer devices. eWeek recently pointed out data from Harris Interactive and Fuzebox which says that tablet users are transferring sensitive information at a greater rate than even smartphone owners.

Harris Interactive polled 2,300-plus adults polled in late January 2011. Almost half (48%) of tablet owners in the survey admitted to using their tablets to transfer sensitive data.

  • 42% of the surveyed said they transfer sensitive personal data on their tablets
  • 20% of tablet owners said they transfer sensitive data for business use,

According to Harris, the survey found that confidence in the security of the data transferred over their mobile devices is skewed according to age and gender.

  • 47% of men are confident
  • 34% of are women are confident

Younger adults are more likely to transfer sensitive data via a tablet:

  • Apple logo61% of respondents 18-34 transfer sensitive data on their tablet;
  • 56% of those surveyed ages 35-44;
  • 33% of those surveyed ages 45-5 4;
  • 20% of those 55+ (20%) to use it to transfer sensitive data.

Not many users are confident in mobile security

  • 18% are extremely/very confident in the security of the data transferred over their device(s).
  • 15% are not at all confident in the security of the data transferred over their device(s).

While the Apple iPad controls the bulk of the tablet market where security is a concern, the advantage may go to Research In Motion (RIMM) says eWeek. The article cites data from Technology Business Research which is also studying enterprise use of tablets, and some of the initial findings show that these users continue to believe that RIM devices are the most secure.

Research In Motion logoThe news could be a boon for RIM according to the author, at least in the short term. The BlackBerry maker is expected to release its PlayBook tablet by the summer and is aiming it at the enterprise. However, lurking in the background is Apple, which dominates the tablet space with its iPad and is growing its reputation for secure products.”IT departments like the ability to manage the devices and data on the devices remotely, including the ability to control access and to securely wipe the devices if they’re lost or stolen,” TBR analyst Ken Hyers told eWEEK. “RIM has succeeded in establishing a high threshold in what is expected from an enterprise-class device in terms of security.

Mr. Hyers added, “RIM’s reputation for security will give it a near-term advantage and help it sell more PlayBooks directly to the enterprise … But over time that advantage will steadily erode.”

From a smartphone vendor standpoint, Apple is establishing its own reputation as a secure device, though not up to the level of RIM,” Mr. Hyers told eWeek. “Apple (and Android mobile devices) also have a distinct edge in usability and appeal; they’re simply easier to use and more fun to use.” Where this becomes a problem for RIM is when businesses let their employees choose the mobile devices they use, as they tend to go for the “sexier” ones, he explained.

rb-

I have been a Blackberry user for 7+ years, but I have wonder if RIMM gets “it” anymore. Is RIMM going to turn into the Novell of the mobile market? A technically better product, but never able to close the deal, getting left in the wake of pretty shiny objects over substance. Given the increasingly crowded market RIMM operates in, the company is facing the same challenges as Novell.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Wireless Charging Amped Up

Wireless Charging Amped UpThose of us tired of dealing with tangled cord and bulky wall warts may get some relief in the near future. iSuppli Corp. is predicting that a flood of new electronic gizmos with wireless charging capabilities will be inundating the market. The market research firm believes that the global market for wireless charging devices for smartphones like the RIM (RIMM) Torch, tablet computers such as the Apple (AAPL) iPad2 media players like the Apple iPod Touch will drive the global market for wireless charging devices to 234.9 million units in 2014, up 65% from 3.6 million in 2010, according to iSuppli.

iSuppli table Tina Teng, senior analyst for wireless research at iSuppli told Itnewslink.com, “Over the next five years, wireless charging devices will find their way into an increasing number of applications, including mobile phones, portable media players, digital still cameras, and mobile PCs.”

Mobile phones will drive wireless charging acceptance according to Ms. Teng, ” …mobile phones will contribute the largest share of revenue to wireless charging-not only because of the large volume of mobile devices expected to benefit from the technology, but also because of participation by name brands in manufacturing the device, providing much-needed market recognition in the process.”

“Genius of Electricity,” 1915, Gilded Bronze, Bedminster, NJ. Photography Lee sandstead"Despite the optimism, iSuppli believes there are still barriers to the widespread adoption of wireless charging. Manufacturers will have to make wireless charging in their devices down to the circuit board level which will drive down costs. The wireless charging industry will need to adopt a common standard to ensure interoperability among products. Currently, all products are proprietary. Skins made by one company, will not work with the charger pad of another. “Until the industry finds a standard to follow, the wireless charging industry will be fragmented, and consumers will hesitate to adopt any solution that could be compromised by the rival companies,” Itnewslink.com quotes Ms. Teng, “However, an open, standardized system will create a healthier competitive environment and prompt manufacturers to join forces-which will enhance consumer awareness and lead to adoption in the markets.”

There are four wireless charging technologies. The wireless charging technologies include Near-field magnetic resistance, Far-field magnetic resistance, Conductive magnetic resistance, and Inductive magnetic resistance wireless charging systems.

  • Far-field magnetic resonance, a technology that has raised safety as well as health concerns and for which no commercial products are available for the time being.
  • Inductive wireless charging uses the principle of electromagnetic induction where current generated from the induced magnetic field in the receiver coil charges devices is the most widely wireless charging technology adopted by the value chain.  the technology enjoys wide support from semiconductor vendors, device manufacturers, accessories makers as well as retailers according to the Wireless Design and Development website. The most successful proponent of magnetic induction is Powermat, a Michigan-based company which I wrote about in 2010, that also owned 62 percent share of the wireless charging market as reported by Wireless Design and Development.

iSuppli notes that most companies are not ready with commercial products yet, several high-profile manufacturers are looking at producing wireless charging solutions. The companies include Texas Instruments (TXN) and ST-Ericsson from the semiconductor side; Nokia Corp (NOK) and Research In Motion Ltd. from the device manufacturer side; and Logitech (LOGI) and Case-Mate from the accessory manufacturer side.

Product-specific wireless charging systems consist of a charger as well as a so-called “skin” or receiver sold for specific devices. These product-specific devices contrast with aftermarket solutions, which are universal chargers and various skins that can be used with multiple consumer electronics. Growth is also projected for aftermarket wireless charging, with revenue rising at a massive five-year Compound Annual Growth Rate (CAGR) of 133.4 percent.

Rats nest of cablesrb-

I hate the cluttered cluster of cables on my desk. The wireless chargers should clean up that mess, but until the manufacturers get their act together and build in some interoperability from the factory, they still got a problem.

What do you think?

Is wireless charging a practical technology?

Do you have a wireless charging rig?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.