Technology Networking & Internet

Cell Phone Security And Your I T Department

When it comes to IT security, our computers aren't the only thing vulnerable. Almost everyone these days has a cell phone, and a cell phone can be hacked too.

One way to infect someone's cell phone is with a malicious program called FlexiSPY. Here's how it works. Let's say that Dave, our company president, wants to follow up a little bit on one of his senior managers, Greg, and find out what he's up to. Dave would simple go to Greg sometime and say, "Greg, do you mind if I borrow your mobile phone? Mine's not working and I want to check in with my family." And Greg says, "Sure, no problem."

So Dave takes his phone. Now Dave has already been to FlexiSPY, and they've already given him the instructions of how to infect Greg's phone with a little virus by simply visiting a web site URL. So Dave does that. He acts like he's dialing the number, and then just to make it look good, he says into the phone, "Yeah, hi. I was just checking in. Is everything okay? Oh yeah, Greg loaned me his phone. He's a great guy. Okay. I'll talk to you later. Bye." Then Dave hands Greg his phone back.

Meanwhile, Greg thinks everything is just dandy. He loaned his boss his phone and he's a good guy. But now, any phone calls that Greg places or receives, Dave is going to get a report of who the other party is, what their phone number is, and how long they were on the phone. All that information is available to Dave for just $49.95.

Now, if Dave decided to splurge and spend $149.95, he can remotely activate the microphone on Greg's phone and actually listen in on Greg's activities any time Greg's phone is turned on. So if Greg is at home tonight with his family, Dave could listen to their conversation at the dinner table. If Greg is in a closed meeting, Dave could listen to the closed meeting. Essentially, Dave could hear anything going on in Greg's life, as long as his phone is turned on.

The CIA knows what a serious danger this technology is. In fact, the CIA is very concerned that this spying technology might get on the cell phones of some of the Chief Justices of the Supreme Court or other high-ranking government officials. If that were to happen, it would really undermine the security of the United States of America.

Therefore, never hand your phone to anyone. If someone asks me to borrow my cell phone, I say, "Sure. But I'm going to dial your number, and I'm going to stand two inches from your face the entire time you have the conversation."

At that, the person who asked to borrow my cell phone usually replies, "Never mind."

If you have recently handed someone your cell phone to use and are wondering if some sort of spying device is on your phone, you could have your IT professional examine the phone. Or, if your phone is getting out of date anyway, now might be a good time to trade in your phone for a new one. You can keep the same phone number, since the virus affects the phone itself and not the phone number.

If you ever look at your phone and see the screen says that the phone is "connected" or "in use" when you didn't place a call or answer a call, then this may indicate that you have some sort of phone spyware on it. Unfortunately, most people don't look at their phone when they're not using it. They just leave it in their belt clip, purse, pocket, in a desk drawer, or on a table.

You would also see tell-tale signs of someone spying on your calls on your phone bill. But not everyone examines their bill, and some people never even see their bills if they use a bookkeeper to mind their finances.

If you have the right tools, you can figure out if something was loaded onto your phone. One company called Trust Digital makes a very nice central management tool to audit, manage, and protect all of your phones and PDA's in the enterprise.

A common theme you will notice in this book for protecting your network is the concept of "Central Management." What's that? Well, ask any IT professional, and they'll tell you that one of the worst things in our career is when we have to change something on all the company's computers. It doesn't matter if you have five computers, fifty computers, five hundred computers, or more, that's way too much work to visit each computer, phone, or PDA, individually. We want to be able to manage things centrally.

Today's organizations have PDAs, cell phones, Blackberries, etc. All of these devices also hold sensitive data. So what happens when one of your employees is traveling for business and accidentally leaves his mobile phone or PDA in a taxi? If you had a central management system in place, that employee would simply call the IT department and tell them what happened. Then someone in IT can make a few keystrokes on the keyboard and erase everything in that particular phone or PDA.

Now, everything on that phone gets securely erased. And when I say securely erased, that means inside that phone it's writing ones and zeros on the data card to actually erase information. Even data forensics can't get that data back anymore. It's just gone.

In the event that whoever rides in the taxi next finds the phone and somehow returns it to you, your IT department can make a few more keystrokes on the keyboard and restore all the data. That sure beats having to go through a four-hour process of reloading everything.

So don't overlook your cell phone and PDA when it comes to data security. There are tools out there that will help you-use them.

Action Item: Treat your cell phone like you treat your toothbrush. Never let anyone use it.
SHARE
RELATED POSTS on "Technology"
What Can You Do to Prevent Link Rot?
What Can You Do to Prevent Link Rot?
What Makes a Phone Line DSL Enabled?
What Makes a Phone Line DSL Enabled?
Boost And Maintain Your Squeeze Page SERP Ranking By Turning It Into A Squeeze Blog
Boost And Maintain Your Squeeze Page SERP Ranking By Turning It Into A Squeeze Blog
Define RocketMail
Define RocketMail
How NOT to market on FaceBook and committ social blunders
How NOT to market on FaceBook and committ social blunders
Check Out These Ideas About Technology Blogging
Check Out These Ideas About Technology Blogging
How to Watch an Item on eBay
How to Watch an Item on eBay
Totally Dumb Copywriting Mistakes To Avoid
Totally Dumb Copywriting Mistakes To Avoid
How to Edit a MySpace Music Profile
How to Edit a MySpace Music Profile
Backlink Energizer Assessment
Backlink Energizer Assessment
Apple iPhone 5 With An Increase Of Additional Features
Apple iPhone 5 With An Increase Of Additional Features
Online Marketing Consultant
Online Marketing Consultant
How Social Bookmarking Can Be Advantageous For Your Website
How Social Bookmarking Can Be Advantageous For Your Website
How to Check My IP for a Blacklist
How to Check My IP for a Blacklist
Which Is Better: Internal or External Modem Software or Hardware?
Which Is Better: Internal or External Modem Software or Hardware?
Attention Empower Newtork Seekers
Attention Empower Newtork Seekers
Free of charge Casino Video games - The On the net Casino Bonus
Free of charge Casino Video games - The On the net Casino Bonus
Why Digital Marketing Should Be Just What The Doctor Ordered
Why Digital Marketing Should Be Just What The Doctor Ordered
Marketing Online Through Social media Marketing Service
Marketing Online Through Social media Marketing Service
Working With The Right SEO Providers
Working With The Right SEO Providers
How To Share a Desktop
How To Share a Desktop
Why Pay for Deutsche Post Secure Email?
Why Pay for Deutsche Post Secure Email?
SMO Company in India – The Best Option for Cost-Effective Online Brand Promotion
SMO Company in India – The Best Option for Cost-Effective Online Brand Promotion

Leave Your Reply

*