The Mac Observer

Skip navigational links

You're viewing an article in TMO's historic archive vault. Here, we've preserved the comments and how the site looked along with the article. Use this link to view the article on our current site:
Gartner: iPod, Portable Devices a Corporate Security Risk

TMO Reports - Gartner: iPod, Portable Devices a Corporate Security Risk

by , 5:00 PM EDT, July 7th, 2004

Companies should consider banning portable storage devices such as Apple's iPod from corporate personal computers because they can spread viruses or steal critical corporate data, according to the research company Gartner, Inc.

The report, obtained by The Mac Observer and issued this week, does not recommend outright the banning of such devices from office environments, but does make it clear that portable USB and FireWire-based products open up businesses to a whole range of risks and that the protection of sensitive information is more important than ever.

The report points out the wide range of such portable devices, including smart media cards, memory sticks, compact flash, keychain drives as well as portable MP3 players. Small portable storage products can bypass perimeter defenses like firewalls and introduce malware such as Trojans or viruses onto company networks, said the report.

"Companies are at risk of losing intellectual property and other critical corporate data," the report said. "Portable storage devices are ideal for anyone intending to steal sensitive and valuable data. Employees may also be responsible for losing data if they inadvertently mislay these devices."

Gartner recommends companies "forbid the use of uncontrolled, privately owned devices with corporate PCs." In addition, the company suggests the adoption of "personal firewalls to limit activity on USB ports", investigate products that can control ports selectively, and "consider employing mobile data protection products to encrypt corporate or sensitive data."

The report ends by telling businesses that they "must ensure that the right procedures and technologies are adopted to securely manage the use of portable storage devices like USB 'keychain' drives. This will help to limit damage from malicious code, loss of proprietary information or intellectual property, and consequent lawsuits and loss of reputation."

Recent Headlines - Updated October 1st

Wed,12:37 AM
Apple Reduces Screen Size in Apple Watch Video to Match Website
Tue,7:17 PM
Samsung Calls Galaxy Note 4 Screen Gap a Feature, not a Flaw
6:04 PM
iOS 8 HealthKit-compatible Apps: TMO’s Growing List
5:14 PM
Apple Releases New Printer Drivers for HP and 7 Other Companies
4:51 PM
iOS 8: How to Enable Notification Center Widgets
4:40 PM
iLuv Vyneer Case for iPhone 6: Fashion, Protection and Transparency
4:33 PM
Microsoft Math: Add 1 to Windows 8 and You Get Windows 10?
3:38 PM
Propellerhead Ships Reason 8 with Emphasis on Drag and Drop Workflow
2:24 PM
The Free Mac Developer Toolkit - 4 Dev Apps for Free
1:29 PM
Apple Will Hold Q4 Conference Call on October 20th
1:10 PM
TMO Daily Observations: 2014-09-30
11:54 AM
4 Cool iOS 8 Photo Extension Apps
  • __________
  • Buy Stuff, Support TMO!
  • Podcast: Mac Geek Gab
  • Podcast: Apple Weekly Report
  • TMO on Twitter!