06.11.2012

Smartphones - Invaluable Business Tool or a Risk to Data Security?

Smartphones - Invaluable Business Tool or a Risk…

twitter icon

There is no doubt that Smartphones have taken the world by storm. With hundreds of millions already in circulation and millions more in manufacture, it’s no surprise to see that they are commonplace in business. The increased functionality that these devices offer, for a comparatively low price, makes them an obvious choice for companies, particularly in the current financial climate. But what are we really doing when we give an employee a Smartphone? Are we giving them a tool to maximise their day-to-day business activities, or are we exposing our company data to loss, theft or even fraud? A device such as an iPhone is delivered with pre-installed applications or ‘Apps’ with the ability to install more either for a very low price or even for free, from a collection of over half a million. With the installation of the right Apps, an iPhone can be transformed from a simple ‘business phone’ into something which could cause some considerable damage to a business, its data and even its reputation. We have taken great leaps in technological development and we have learnt that we need to ‘batten down the hatches’ where our computer network is concerned with firewalls, regulatory compliance, data monitoring and many other controls. Many businesses will block the use of external peripherals such as USB drives etc., but what if I just take a photograph of the computer screen using my Smartphone? I can then convert the photograph to a selection of different document types and email this to myself, or maybe a competitor. Maybe I could upload it to a social networking site. I could also take a photograph of the documents on my manager’s desk, which contain his signature and then use that signature for my own benefit. These are examples of data breach in their simplest form and illustrate the fact that the ‘business phone’ has become a camera, a document scanner, a wireless dongle, a sat nav, an internet browser, a covert listening device….. The list goes on. If an employee leaves the business and hands over his laptop and Smartphone, can you be sure that he doesn’t have a full backup on his personal computer? Forensic analysis of computers seized in fraud investigations involving staff show that Smartphone backups should be a genuine cause for concern as they appear frequently. These backups are of significant forensic interest as they allow an investigator to examine the phone evidence, without actually having the phone. What these examples show is that the risks are constantly changing for business, which means that policies, procedures and controls need to be in constant development. Indeed, we need to understand the true capabilities of the devices we introduce into our business. Zentek Forensics are available to assist companies with understanding, managing and preventing the risks posed by Smartphones and many other devices. For more information, please call Sarah Lyons on 0844 412 8625.


Expertise


Forensic Computer Analysis
Follow us for more articles and posts direct from professionals on      
Legal

Digital Forensics, What's it all About? - In this...

It is common for a digital forensic examiner to be asked two questions upon divulging job title. The first of these…

Would you like to promote an article ?

Post articles and opinions on Manchester Professionals to attract new clients and referrals. Feature in newsletters.
Join for free today and upload your articles for new contacts to read and enquire further.