Directly from the Financial Times, Mobile Threats and Solutions:
¦ Loss or theft of hardware: Use removable media, encrypt data, and physically secure laptops using a notebook security lock from a company such as Belkin.
¦ Physical intrusion – a USB key sucks data from a hard drive or loads malware: Keep laptop within sight, or lock it with a secure password when left.
¦ Wireless threat, where a laptop is connected to a poorly configured network, allowing others to browse files while installing a key logger: Turn off file and printer sharing. Configure software firewall not to trust the local network. Install anti-virus and anti-spyware protection.
¦ Shoulder surfing (snoopers watching you type): Notebook privacy filters restrict a screen’s viewability, but avoid sensitive work in public.
¦ Man in the middle (a wireless notebook and 3G card pretends to be legitimate, providing internet access but snooping): Do not connect to the first network seen. Watch for duplicate network names. Do not send sensitive data in clear text format. Surf via head office through a virtual private network to encrypt traffic. Better still, buy a 3G card.
¦ Malicious sites and services, where laptop is infected with malware: Surf responsibly; use software that blocks suspicious URLs. Do not let others use your laptop. Keep system patches and security software up to date. Do not run in administrative mode.
¦ Bluetooth attacks (an attacker controls the phone and dials premium rate numbers or copies messages, contacts): Turn off Bluetooth when it is not needed.
¦ Viruses: Do not open unrecognised e-mail attachments. Use anti-virus and anti-spam software. Only download e-mail via corporate servers, which should have strong anti-spam capabilities. Be wary when inserting a USB key.
Scopri di più da Luca Bonesini
Abbonati per ricevere gli ultimi articoli inviati alla tua e-mail.