- Top 10 Recession-Proof IT Jobs
- 7 Hot IT Jobs That Will Land You a Higher Salary
- Link Building Strategies and Tips for 2014
- Top 10 Accessories for Your iPad Air
Industry analysis by expert Joanie Wexler, plus links to the day's wireless news headlines
Last time, I discussed the futility of attempting to outlaw mobile camera phone use in enterprises to avoid the security and liability risks they pose.
I consider mobile camera phones to be just one more enabler of potential security breaches. Security risks will only multiply as technology gets smaller and more innovative. The cool communications tools that become available to make employees more productive also represent new opportunities for someone else to exploit them for wrongdoing.
So what are some of the security concerns at hand with the camera phones? To name just a few:
* Someone could snap and transmit photos for reconnaissance, such as the location of surveillance cameras and alarms.
* Pictures of how you have organized your manufacturing floor, warehouse, or other location for strategic advantage could give your competitor ideas.
* Photos of the department hunk or sweetheart snapped in the office and circulated on the intranet/Internet could set up the company for a sexual harassment suit. (Not a new problem. Consumers with home pages frequently stir up the ire of family and friends when unflattering pictures are posted for the world to see.)
For additional blackmail potential of camera phones, see Network World Fusion Executive Editor Adam Gaffin's "Compendium" from earlier this month: http://napps.nwfusion.com/compendium/archive/004079.html
Video aside, a "Wireless in the Enterprise" newsletter I wrote nearly two years ago noted that visitors with some access privileges (like consultants) and a dual-mode Wi-Fi/cellular network card in their laptops pose potential threats. These folk could transfer information via a cellular link to who-knows-where, completely bypassing the corporate firewall and VPN.
The addition of video only expands the possibilities.
The place to start is whether you should set up security policies for unobtrusive communications devices like camera phones. If you decide you need a policy, here are a few questions to consider:
* Will the policy apply to both employees and visitors?
* Who will be responsible for enforcing the policy - and what will be the procedure for doing so? (Honor system, full-body searches...)
* How will you educate employees and visitors about the policy - and what will be the repercussions of a violation?
* Will the policy apply enterprise-wide or only in certain locations?
Read more about wireless & mobile in Network World's Wireless & Mobile section.
Joanie Wexler is an independent networking technology writer/editor in Silicon Valley.