Monday, March 10, 2008

Protecting the Mobile Workforce

The productivity benefits of smart phones and other mobile devices are difficult to ignore, and enterprises will continue to role them out across their workforce. For CIOs and other senior IT personnel the time to consider and implement a comprehensive mobile security policy is now.

Security measures should take into account security threats that are both external and internal while enabling a holistic approach that encompasses personalization and other access controls. The mobile environment has numerous weaknesses, and specialized threats are growing increasingly severe. Currently, there are over 300 mobile virus variants loose globally. The latest versions are more sophisticated and attack a device with the purpose of generating revenue or stealing confidential stored data.

Avenues for mobile communication

Three weeks ago, we opened up a discussion in Techno Page about creative new ways in which mobile communication infrastructure could be used. I pointed out that thorough identification and registration process that mobile phone subscribers are subjected to in Sri Lanka, opens up the possibility for mobile phones to be used by their users to make payments in a way that is not very different from how credit cards or debit cards are used.

A few users wrote in demanding me to explain what I meant, so this week, I will oblige them with the details. In principle, what I pointed out was that mobile phones have the potential to be used as another method in which Electronic Funds Transfers at Point of Sale (EFTPOS) could be implemented….