SAS 70

Jun 12 2008   8:51PM GMT

iPhone’s and data security

Keith Harrell Profile: SAS70ExPERT

Tags:
Order Management

What about the new iPhone? It has an abundance of new features and new headaches? With the latest push of emails to your iPhone, how many more network issues will this create? 

With the iPhone, you can download, pictures, music, and applications – how many of these will have undetected viruses or Trojan horses? As executives demand more technology, do you have enough security in place to prevent such disasters to your network? How much downtime can you afford? 

In a SAS70 audit, wireless networks and the related controls are normally tested. Testing of phone connectivity to internal networks and the related hazards are not normal considerations. 

I would recommend standardization of cell phones. Chose a cell phone that meets business needs and provides basic communication access for employees. Enact most security features to prevent rogue viruses from attacking your network. The phones should only sync with your business Exchange server and not the employee’s personal contacts or emails.

 

1  Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Unixboy
    I am very concerned. At my Company we have no standardization around what type of phone anyone can use. In addition, many find ways to sync up to their local Outlook or Lotus notes contacts database. When they do, it seems that they either have problems with their laptops, specifically corrupting their registry, which causes their laptop to crash; Or, their new phone's operating system goes on the blink. I would highly suggest developing an internal policy and getting it approved by Management. Then only allow those approved phones to be used. Second, make sure you virus software is kept up to date. This will reduce some of the risk of downloading a virus onto their laptop or uploading one onto their phone.
    0 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: