Your SlideShare is downloading. ×
Easy To Use Or Easy To Lose   How To Protect Mobile Devices
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Easy To Use Or Easy To Lose How To Protect Mobile Devices

390

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
390
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Professional liability fund www.osbplf.org Malprac t i ce Pre ve n t i o n Ed u ca t i o n f o r O re g o n La w ye r s Easy to Use or Easy to Lose? How to Protect Mobile Devices 6. Explore Data Wiping. Research in Mobile devices like the BlackBerry and Palm Motion’s BlackBerry Enterprise Server, as an Treo have become indispensable tools for many example, comes with a feature that wipes all data lawyers. Compact and easy to use, these devices from the device’s memory once a certain num- offer quick access to calendars, contacts, e-mail, ber of failed log-in attempts are exceeded. The documents, and other sensitive personal and cli- current version of Microsoft Exchange provides ent information. Unfortunately, the portability for a remote wipe of a lost or stolen Windows of such devices also makes them highly prone to PDA. Remember that if you have regularly syn- loss or theft. If you or members of your firm use chronized your device, the destroyed data can be a PDA, smartphone, or similar device, take ap- easily restored to a replacement device. propriate steps to protect client confidentiality: 7. Starve the Virus. Virus attacks on 1. Limit Use. Restrict the type of informa- handheld devices are rare but potentially dev- tion stored on a handheld device to reduce your astating if a compromised mobile device is exposure. synched to a desktop or network. All the major 2. Standardize. If more than one handheld antivirus vendors, including Symantec (Norton device is used, everyone in the firm should use Smartphone Security) and McAfee (McAfee the same type of device. Do not allow outside de- Mobile Security), offer security products de- vices. In the event of a problem, it will be easier signed for mobile platforms. Visit www. sy- to implement a firm-wide solution if everyone is mantec.com and www.mcafee.com for more using the same product. information. tHis issue 3. Password Protect. Use “power-on” 8. Learn More. To learn more about mobile passwords. If the device is lost or stolen, data on august 2008 devices, visit resources like the PDA Learning the device cannot be accessed without the pass- Center at http://palmtops.about.com/od/pda- issue 105 word. learningcenter/PDA_Learning_Center.htm or 4. Use the Lock-out Feature. Set devices www.pdatoday.com. to lock out users after a specified number of in- correct log-in attempts. Use “sleep” settings to Beverly A. MichAelis lock devices after 10 or 15 minutes of inactivity. PlF PrActice MAnAgeMent Advisor 5. Consider Encryption or Biometrics. Products like SafeGuard PDA from Utimaco go beyond password protection and lockouts to protect data by using encryption and biomet- rics. Biometrics protect data by requiring sig- nature, voice, or fingerprint authentication. If the device doesn’t recognize the user, it can’t be accessed. Visit http://americas.utimaco. com/safeguard_pda for more information. DISCLAIMER IN BRIEF includes claim prevention information that helps you to minimize the likelihood of being sued for legal malpractice. the material presented does not establish, report, or create the standard of care for attorneys. the articles do not represent a complete analysis of the topics presented, and readers should conduct their own appropriate research.

×