Home The Intro The Need The Threat The device The company Feedback

 

 

The threat

When a company’s information gets distributed outside the LAN/WAN infrastructure, a number of different threats or security risks come into play. What happens if a device containing company information is lost or stolen? Is there any information on the device that might incriminate the company or its customers? Is there some kind of liability connected to losing information that is not protected in a reasonable way?

 The PIM is one of the most useful tools to bring on meetings and business trips. Phone numbers, addresses, contacts, notes and e-mails (with attachments) are easily stored in the PIM. But the PIM in it self is non-secure. To leave the device unattended might give someone the chance to read information in the PIM or to simply steal it. It is common knowledge that losing your phone or having it stolen is often the lea.

 

Send mail to michaelh@networx.se with questions or comments about this web site.
Copyright © 2003 Networx AB
Last modified: 07/29/03