SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
March 2013 ITNOW 25
It’s been 30 years since the first commercial
handheld cellular phone hit the market.
Costing $3,995, and likened to a brick, it
immediately gained a long waiting list.
Price and size has reduced in the
intervening years, and popularity has
soared. Technology has moved from
analogue to digital and handsets can now
do so much more than make and receive
voice telephone calls.
We’ve seen the introduction of short
message service (SMS), multi-media
message service (MMS), PDA functions
(address book, calendar, notes), email,
browsing (WAP through to modern
browsers), full internet access and apps.
Each new capability has opened up
additional potential exposures for users.
Modern smartphones combine
elements of mobile phone, PDAs and
laptop into a small, easily lost or stolen,
high value device. With increasing storage
capacity and financial capabilities, such as
e-wallets and near-field communication
(NFC), we are storing more and more
confidential information. Its value, and
impact when lost, just increases.
Although manufacturers, operators,
OS/app vendors and businesses try and
control and/or secure their platforms,
there are limits to what is technically
possible and acceptable to users. Many
people are no longer content with a device
that cannot perform the functions or run
the apps they see others do.
Some take exception to any level of
control/security and will ‘jailbreak’ or
unlock devices so that they can run
INFORMATION SECURITY
what they want on whatever network is
available. Phones are not the only devices
we’re mobile with either. PDAs, laptops,
tablets all add to the risk and complexity,
as does the growth in employees using
their own devices and bringing them into
the enterprise.
Users need to be risk aware and
organisations must cope, educate and
secure.
www.bcs.org/security
Gareth Niblett, Chairman of the BCS Information Security Specialist
Group, thinks mobile security is about education.
Information Security Specialist
Group (ISSG):
www.bcs-issg.org.uk
Information Risk Management and
Assurance Specialist Group:
www.bcs.org/groups/irma
BCS Security Community of
Expertise (SCoE):
www.bcs.org/securitycommunity
FURTHER INFORMATION
COPE
EDUCATE
SECURE
doi:10.1093/itnow/bws135©2013TheBritishComputerSocietyImage:iStockPhoto/124929990
INTERACTING
WITH COMPUTERS
General Editor: Dianne M. Murray
Deputy Editor: Gitte Lindgaard
FROM 2013, OXFORD UNIVERSITY PRESS WILL BE THE PROUD PUBLISHERS OF
Visit www.iwc.oxfordjournals.org to:
Browse tables of contents and abstracts
Download full text articles
(if your library subscribes)
Submit your paper
Sign up for table of contents email alerts
Read a free sample issue
And more!
1
Don’t miss a single issue
Sign up for free email table of contents alerts at
www.iwc.oxfordjournals.org
or simply scan this QR code with your smartphone.
Subscribe for as little as £70 + VAT
As a member of BCS, you can subscribe
to Interacting with Computers online for
only £70 +VAT (non-member price £110)

Más contenido relacionado

La actualidad más candente

Mobile monday Brussels presentation and Trends
Mobile monday Brussels presentation and TrendsMobile monday Brussels presentation and Trends
Mobile monday Brussels presentation and TrendsMobile Monday Brussels
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
Vibemedia: Mobile Internet and Connected Services
Vibemedia: Mobile Internet and Connected ServicesVibemedia: Mobile Internet and Connected Services
Vibemedia: Mobile Internet and Connected ServicesGareth Capon
 
Power point presentation
Power point presentationPower point presentation
Power point presentationmisha4
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityGareth Niblett
 
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenI4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenPaul van Heel
 
Managed Mobility Services (MMS) Market | Exclusive Report on the Latest Trend...
Managed Mobility Services (MMS) Market | Exclusive Report on the Latest Trend...Managed Mobility Services (MMS) Market | Exclusive Report on the Latest Trend...
Managed Mobility Services (MMS) Market | Exclusive Report on the Latest Trend...FredWilliams42
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesInternet Society
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismPaul van Heel
 
Schilling Chapter 4
Schilling Chapter 4Schilling Chapter 4
Schilling Chapter 4FajriRamadan
 
foedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyfoedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyMaliha Ghazal
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfarahsyed9
 
GPNOct2017-Digital-Economy-Outlook
GPNOct2017-Digital-Economy-OutlookGPNOct2017-Digital-Economy-Outlook
GPNOct2017-Digital-Economy-OutlookHolly Richards
 
social production for social entrepreneurs
social production for social entrepreneurssocial production for social entrepreneurs
social production for social entrepreneursMark Herringer
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
 

La actualidad más candente (18)

Mobile monday Brussels presentation and Trends
Mobile monday Brussels presentation and TrendsMobile monday Brussels presentation and Trends
Mobile monday Brussels presentation and Trends
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
Vibemedia: Mobile Internet and Connected Services
Vibemedia: Mobile Internet and Connected ServicesVibemedia: Mobile Internet and Connected Services
Vibemedia: Mobile Internet and Connected Services
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 
Mobile Direct Marketing
Mobile Direct MarketingMobile Direct Marketing
Mobile Direct Marketing
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic Security
 
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenI4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
 
Managed Mobility Services (MMS) Market | Exclusive Report on the Latest Trend...
Managed Mobility Services (MMS) Market | Exclusive Report on the Latest Trend...Managed Mobility Services (MMS) Market | Exclusive Report on the Latest Trend...
Managed Mobility Services (MMS) Market | Exclusive Report on the Latest Trend...
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
 
ISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global Opportunities
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
 
Schilling Chapter 4
Schilling Chapter 4Schilling Chapter 4
Schilling Chapter 4
 
foedumed: Computing issues that affect the society
foedumed: Computing issues that affect the societyfoedumed: Computing issues that affect the society
foedumed: Computing issues that affect the society
 
foedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the societyfoedumed 37_16 Computing issues that affect the society
foedumed 37_16 Computing issues that affect the society
 
GPNOct2017-Digital-Economy-Outlook
GPNOct2017-Digital-Economy-OutlookGPNOct2017-Digital-Economy-Outlook
GPNOct2017-Digital-Economy-Outlook
 
social production for social entrepreneurs
social production for social entrepreneurssocial production for social entrepreneurs
social production for social entrepreneurs
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 

Destacado

Widdit-NOAH12 London
Widdit-NOAH12 LondonWiddit-NOAH12 London
Widdit-NOAH12 LondonNOAH Advisors
 
Design Thinkin workshop for Successfactors partners presales champions program
Design Thinkin workshop for Successfactors partners presales champions programDesign Thinkin workshop for Successfactors partners presales champions program
Design Thinkin workshop for Successfactors partners presales champions programVigram V
 
Digital literacy5th
Digital literacy5thDigital literacy5th
Digital literacy5thmrsaellis
 
hsvo1-ConfirmationOfParticipation
hsvo1-ConfirmationOfParticipationhsvo1-ConfirmationOfParticipation
hsvo1-ConfirmationOfParticipationRupa Chandran
 
Letter_Of_Certification_Sumit_V2
Letter_Of_Certification_Sumit_V2Letter_Of_Certification_Sumit_V2
Letter_Of_Certification_Sumit_V2Sumit Mehra
 
Haurrak Eta Internet
Haurrak Eta InternetHaurrak Eta Internet
Haurrak Eta InternetGarazzi
 
Neomobile - NOAH12 London
Neomobile - NOAH12 LondonNeomobile - NOAH12 London
Neomobile - NOAH12 LondonNOAH Advisors
 
Big Data with SAP HANA Vora
Big Data with SAP HANA VoraBig Data with SAP HANA Vora
Big Data with SAP HANA VoraVigram V
 
TEORÍA DE LOS QUEBRANTOS DE LAS EXPECTATIVAS
TEORÍA DE LOS QUEBRANTOS DE LAS EXPECTATIVASTEORÍA DE LOS QUEBRANTOS DE LAS EXPECTATIVAS
TEORÍA DE LOS QUEBRANTOS DE LAS EXPECTATIVASDavid Nuñez
 

Destacado (14)

Widdit-NOAH12 London
Widdit-NOAH12 LondonWiddit-NOAH12 London
Widdit-NOAH12 London
 
Design Thinkin workshop for Successfactors partners presales champions program
Design Thinkin workshop for Successfactors partners presales champions programDesign Thinkin workshop for Successfactors partners presales champions program
Design Thinkin workshop for Successfactors partners presales champions program
 
Digital literacy5th
Digital literacy5thDigital literacy5th
Digital literacy5th
 
Jubrac de videira sc
Jubrac de videira   scJubrac de videira   sc
Jubrac de videira sc
 
(S)miles (1)
(S)miles (1)(S)miles (1)
(S)miles (1)
 
BUMI ed2
BUMI ed2BUMI ed2
BUMI ed2
 
CERTIFACATE.PDF
CERTIFACATE.PDFCERTIFACATE.PDF
CERTIFACATE.PDF
 
hsvo1-ConfirmationOfParticipation
hsvo1-ConfirmationOfParticipationhsvo1-ConfirmationOfParticipation
hsvo1-ConfirmationOfParticipation
 
Letter_Of_Certification_Sumit_V2
Letter_Of_Certification_Sumit_V2Letter_Of_Certification_Sumit_V2
Letter_Of_Certification_Sumit_V2
 
Haurrak Eta Internet
Haurrak Eta InternetHaurrak Eta Internet
Haurrak Eta Internet
 
Neomobile - NOAH12 London
Neomobile - NOAH12 LondonNeomobile - NOAH12 London
Neomobile - NOAH12 London
 
Big Data with SAP HANA Vora
Big Data with SAP HANA VoraBig Data with SAP HANA Vora
Big Data with SAP HANA Vora
 
TEORÍA DE LOS QUEBRANTOS DE LAS EXPECTATIVAS
TEORÍA DE LOS QUEBRANTOS DE LAS EXPECTATIVASTEORÍA DE LOS QUEBRANTOS DE LAS EXPECTATIVAS
TEORÍA DE LOS QUEBRANTOS DE LAS EXPECTATIVAS
 
Of Bikes & Bits
Of Bikes & BitsOf Bikes & Bits
Of Bikes & Bits
 

Similar a BCS ITNow 201303 - Cope, Educate, Secure

271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docxlorainedeserre
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environmentIBM Software India
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobilityreneznet105
 
Mobile Learning Technologies
Mobile Learning TechnologiesMobile Learning Technologies
Mobile Learning TechnologiesIJAAS Team
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobilityreneznet105
 
Asian Giants Catching Up with the Global LTE Leaders
Asian Giants Catching Up with the Global LTE LeadersAsian Giants Catching Up with the Global LTE Leaders
Asian Giants Catching Up with the Global LTE LeadersSohag Sarkar
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICEMicrosoft India
 
Mobile Technologies.pptx
Mobile Technologies.pptxMobile Technologies.pptx
Mobile Technologies.pptxBryCunal
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 

Similar a BCS ITNow 201303 - Cope, Educate, Secure (20)

271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
E-Mobile
E-Mobile E-Mobile
E-Mobile
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
 
Mobile Learning Technologies
Mobile Learning TechnologiesMobile Learning Technologies
Mobile Learning Technologies
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
 
Mobile security
Mobile securityMobile security
Mobile security
 
Asian Giants Catching Up with the Global LTE Leaders
Asian Giants Catching Up with the Global LTE LeadersAsian Giants Catching Up with the Global LTE Leaders
Asian Giants Catching Up with the Global LTE Leaders
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 
Mobile Technologies.pptx
Mobile Technologies.pptxMobile Technologies.pptx
Mobile Technologies.pptx
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 

Más de Gareth Niblett

Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Gareth Niblett
 
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsBCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsGareth Niblett
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsGareth Niblett
 
BCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber ResponseBCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber ResponseGareth Niblett
 
BCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share SecurelyBCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share SecurelyGareth Niblett
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsGareth Niblett
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionGareth Niblett
 
BCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessBCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessGareth Niblett
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnGareth Niblett
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertGareth Niblett
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletGareth Niblett
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityGareth Niblett
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationGareth Niblett
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceGareth Niblett
 
RIPA: Perception and Practice
RIPA: Perception and PracticeRIPA: Perception and Practice
RIPA: Perception and PracticeGareth Niblett
 

Más de Gareth Niblett (15)

Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)
 
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsBCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest Threats
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider Threats
 
BCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber ResponseBCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber Response
 
BCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share SecurelyBCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share Securely
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 Threats
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
 
BCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessBCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk Business
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going On
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay Alert
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver Bullet
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber Innovation
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber Defence
 
RIPA: Perception and Practice
RIPA: Perception and PracticeRIPA: Perception and Practice
RIPA: Perception and Practice
 

BCS ITNow 201303 - Cope, Educate, Secure

  • 1. March 2013 ITNOW 25 It’s been 30 years since the first commercial handheld cellular phone hit the market. Costing $3,995, and likened to a brick, it immediately gained a long waiting list. Price and size has reduced in the intervening years, and popularity has soared. Technology has moved from analogue to digital and handsets can now do so much more than make and receive voice telephone calls. We’ve seen the introduction of short message service (SMS), multi-media message service (MMS), PDA functions (address book, calendar, notes), email, browsing (WAP through to modern browsers), full internet access and apps. Each new capability has opened up additional potential exposures for users. Modern smartphones combine elements of mobile phone, PDAs and laptop into a small, easily lost or stolen, high value device. With increasing storage capacity and financial capabilities, such as e-wallets and near-field communication (NFC), we are storing more and more confidential information. Its value, and impact when lost, just increases. Although manufacturers, operators, OS/app vendors and businesses try and control and/or secure their platforms, there are limits to what is technically possible and acceptable to users. Many people are no longer content with a device that cannot perform the functions or run the apps they see others do. Some take exception to any level of control/security and will ‘jailbreak’ or unlock devices so that they can run INFORMATION SECURITY what they want on whatever network is available. Phones are not the only devices we’re mobile with either. PDAs, laptops, tablets all add to the risk and complexity, as does the growth in employees using their own devices and bringing them into the enterprise. Users need to be risk aware and organisations must cope, educate and secure. www.bcs.org/security Gareth Niblett, Chairman of the BCS Information Security Specialist Group, thinks mobile security is about education. Information Security Specialist Group (ISSG): www.bcs-issg.org.uk Information Risk Management and Assurance Specialist Group: www.bcs.org/groups/irma BCS Security Community of Expertise (SCoE): www.bcs.org/securitycommunity FURTHER INFORMATION COPE EDUCATE SECURE doi:10.1093/itnow/bws135©2013TheBritishComputerSocietyImage:iStockPhoto/124929990 INTERACTING WITH COMPUTERS General Editor: Dianne M. Murray Deputy Editor: Gitte Lindgaard FROM 2013, OXFORD UNIVERSITY PRESS WILL BE THE PROUD PUBLISHERS OF Visit www.iwc.oxfordjournals.org to: Browse tables of contents and abstracts Download full text articles (if your library subscribes) Submit your paper Sign up for table of contents email alerts Read a free sample issue And more! 1 Don’t miss a single issue Sign up for free email table of contents alerts at www.iwc.oxfordjournals.org or simply scan this QR code with your smartphone. Subscribe for as little as £70 + VAT As a member of BCS, you can subscribe to Interacting with Computers online for only £70 +VAT (non-member price £110)