Topic 4 - Technology Specific Vulnerabilities

You must also protect information stored or transmitted on devices other than your computer. These include fax machines, cell phones, laptops, and personal digital assistants, or PDAs, such as Palm Pilots. You need to be as vigilant about security on these devices as you are with your computer at work. Learn more by reading below.

Fax
Be careful with information transmitted over a fax machine. Make sure that the recipient will be there to pick up the fax immediately if you are sending sensitive information.

Cell Phone
Remember that cell phones are nothing more than glorified transmitters. Anyone with the right equipment could potentially listen to your conversation. Use a landline for more privacy, and never discuss sensitive information on an unsecure phone.

Laptop
The convenience of laptops also makes them vulnerable to theft or security breaches. Password protect the logon to your laptop. Be careful what you display on your screen, especially in close quarters such as airplanes. Be aware of your laptop when traveling to prevent theft.

Personal Digital Assistants (PDAs)
PDAs, such as PalmPilots or Pocket PCs, pose a security threat for a number of reasons. Their small size and low cost make them easy to obtain and difficult to control. They have tremendous connectivity and storage capabilities, and are extremely popular. It can be very easy for a person to setup a PDA to download information from your computer.
 

Back | Next

Module 4

Main Menu

Resources