Smartphone are terrific devices that users love because it can significantly increase their productivity levels. Devices such as BlackBerry Torch, HTC Aria and the iPhone are in considerable demand for professionals in the workplace.

Security and Information Technology professionals are not as enthusiastic about the devices. These professionals have stated that the products include the following items that make them particularly vulnerable to security breaches.

Smart Phone
  • Handheld devices are actually smaller versions of personal computers
  • Various companies realize the benefits of deploying these handheld devices
  • Handheld devices contain sensitive information when used in enterprises
  • Employees use devices for non-business functions and business functions

One thing that businesses fail to do is include handheld devices in their company security plans. This should prove indispensable when the majority of their company employees own handheld devices.

What should be included in the security plan?

The following is what should be included in company security plans when dealing with handheld devices:



  • Rogue applications
    Security decisions are handed over to end users, who turn over the decision to the store where the application was purchased. Typically, this is an endless chain that has various links that can be easily broken and the result being HUGE security concerns.
  • Accidentally transferring data
    iPhones have a default action when connected to personal computers to back up the contents. When this happens on employees home computers, the phones contain company information, and the result is the IT department losing control of that data.
  • Firewalls
    Smartphones email clients might not be connected to applications that deny access to malware or other websites established by hackers/criminals. Sometimes Fire break out and at that time Smoke Alarm can be used. If users accidentally click onto these suspicious links in an email, without any security protection, there is nothing that can prevent these devices from performing an unequivocal connection to malicious websites.
  • Serious gaps in security
    Smartphones contain memory is large quantities and can be used in transporting data from a company.

It has been highly recommended that mobile internet security be included in company security SOPs (Standard Operating Procedures). Mobile security is about context because there are different ways that mobile users can gain access to. It is also highly recommended that companies develop an understanding why people use these handheld devices. This will allow companies to properly respond to this problem while not decreasing productivity.

The mobile device management industry has provided various recommendations, but nothing as of yet, has aided in evolving toward permanent solutions. Some of the hinted-solutions are finally integrating support for applications, policies, devices, service management and most-importantly security. Companies should always have calculated views of smartphone and program management while aligning their choice of mobile device management with their mobility strategies.

Author Box
The post is shared by a Guest Author: William Taylor. William believes in sharing knowledge by blogging. He loves to write on latest tips and tricks to handle technology.