• Save
Easy To Use Or Easy To Lose   How To Protect Mobile Devices
Upcoming SlideShare
Loading in...5
×
 

Easy To Use Or Easy To Lose How To Protect Mobile Devices

on

  • 719 views

 

Statistics

Views

Total Views
719
Views on SlideShare
719
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Easy To Use Or Easy To Lose   How To Protect Mobile Devices Easy To Use Or Easy To Lose How To Protect Mobile Devices Document Transcript

  • Professional liability fund www.osbplf.org Malprac t i ce Pre ve n t i o n Ed u ca t i o n f o r O re g o n La w ye r s Easy to Use or Easy to Lose? How to Protect Mobile Devices 6. Explore Data Wiping. Research in Mobile devices like the BlackBerry and Palm Motion’s BlackBerry Enterprise Server, as an Treo have become indispensable tools for many example, comes with a feature that wipes all data lawyers. Compact and easy to use, these devices from the device’s memory once a certain num- offer quick access to calendars, contacts, e-mail, ber of failed log-in attempts are exceeded. The documents, and other sensitive personal and cli- current version of Microsoft Exchange provides ent information. Unfortunately, the portability for a remote wipe of a lost or stolen Windows of such devices also makes them highly prone to PDA. Remember that if you have regularly syn- loss or theft. If you or members of your firm use chronized your device, the destroyed data can be a PDA, smartphone, or similar device, take ap- easily restored to a replacement device. propriate steps to protect client confidentiality: 7. Starve the Virus. Virus attacks on 1. Limit Use. Restrict the type of informa- handheld devices are rare but potentially dev- tion stored on a handheld device to reduce your astating if a compromised mobile device is exposure. synched to a desktop or network. All the major 2. Standardize. If more than one handheld antivirus vendors, including Symantec (Norton device is used, everyone in the firm should use Smartphone Security) and McAfee (McAfee the same type of device. Do not allow outside de- Mobile Security), offer security products de- vices. In the event of a problem, it will be easier signed for mobile platforms. Visit www. sy- to implement a firm-wide solution if everyone is mantec.com and www.mcafee.com for more using the same product. information. tHis issue 3. Password Protect. Use “power-on” 8. Learn More. To learn more about mobile passwords. If the device is lost or stolen, data on august 2008 devices, visit resources like the PDA Learning the device cannot be accessed without the pass- Center at http://palmtops.about.com/od/pda- issue 105 word. learningcenter/PDA_Learning_Center.htm or 4. Use the Lock-out Feature. Set devices www.pdatoday.com. to lock out users after a specified number of in- correct log-in attempts. Use “sleep” settings to Beverly A. MichAelis lock devices after 10 or 15 minutes of inactivity. PlF PrActice MAnAgeMent Advisor 5. Consider Encryption or Biometrics. Products like SafeGuard PDA from Utimaco go beyond password protection and lockouts to protect data by using encryption and biomet- rics. Biometrics protect data by requiring sig- nature, voice, or fingerprint authentication. If the device doesn’t recognize the user, it can’t be accessed. Visit http://americas.utimaco. com/safeguard_pda for more information. DISCLAIMER IN BRIEF includes claim prevention information that helps you to minimize the likelihood of being sued for legal malpractice. the material presented does not establish, report, or create the standard of care for attorneys. the articles do not represent a complete analysis of the topics presented, and readers should conduct their own appropriate research.