The Mac Observer

Skip navigational links

You're viewing an article in TMO's historic archive vault. Here, we've preserved the comments and how the site looked along with the article. Use this link to view the article on our current site:
Gartner: iPod, Portable Devices a Corporate Security Risk

TMO Reports - Gartner: iPod, Portable Devices a Corporate Security Risk

by , 5:00 PM EDT, July 7th, 2004

Companies should consider banning portable storage devices such as Apple's iPod from corporate personal computers because they can spread viruses or steal critical corporate data, according to the research company Gartner, Inc.

The report, obtained by The Mac Observer and issued this week, does not recommend outright the banning of such devices from office environments, but does make it clear that portable USB and FireWire-based products open up businesses to a whole range of risks and that the protection of sensitive information is more important than ever.

The report points out the wide range of such portable devices, including smart media cards, memory sticks, compact flash, keychain drives as well as portable MP3 players. Small portable storage products can bypass perimeter defenses like firewalls and introduce malware such as Trojans or viruses onto company networks, said the report.

"Companies are at risk of losing intellectual property and other critical corporate data," the report said. "Portable storage devices are ideal for anyone intending to steal sensitive and valuable data. Employees may also be responsible for losing data if they inadvertently mislay these devices."

Gartner recommends companies "forbid the use of uncontrolled, privately owned devices with corporate PCs." In addition, the company suggests the adoption of "personal firewalls to limit activity on USB ports", investigate products that can control ports selectively, and "consider employing mobile data protection products to encrypt corporate or sensitive data."

The report ends by telling businesses that they "must ensure that the right procedures and technologies are adopted to securely manage the use of portable storage devices like USB 'keychain' drives. This will help to limit damage from malicious code, loss of proprietary information or intellectual property, and consequent lawsuits and loss of reputation."

Recent Headlines - Updated October 23rd

Wed,8:40 PM
Mark Zuckerberg Wows Chinese Crowd with 30 Minute Interview in Chinese
8:06 PM
How to Use Yosemite’s New Batch-Renaming Feature
7:59 PM
How to Make Calls from Yosemite the Geeky Way
7:55 PM
Continuity Keypad Makes Calling From Yosemite Easier
7:51 PM
The Name Your Own Price Game Design Bundle
3:00 PM
OS X Yosemite: The Quintessential Review
1:25 PM
TMO Daily Observations: 2014-10-22
10:55 AM
AT&T Wireless Offers iPad Air 2, mini 3 for $100 off
9:55 AM
Apple Launches Maps Connect, Allows Users To Update Info
Tue,8:51 PM
GTAT Announces ‘Amicable Parting’ of Ways with Apple
6:50 PM
How I Came to Own and Sell a TAM Probably Owned by Jony Ive
5:01 PM
Adobe KnowHow: Learn Photography From The Best for $29.99
  • __________
  • Buy Stuff, Support TMO!
  • Podcast: Mac Geek Gab
  • Podcast: Apple Weekly Report
  • TMO on Twitter!