The Mac Observer

Skip navigational links

You're viewing an article in TMO's historic archive vault. Here, we've preserved the comments and how the site looked along with the article. Use this link to view the article on our current site:
Gartner: iPod, Portable Devices a Corporate Security Risk

TMO Reports - Gartner: iPod, Portable Devices a Corporate Security Risk

by , 5:00 PM EDT, July 7th, 2004

Companies should consider banning portable storage devices such as Apple's iPod from corporate personal computers because they can spread viruses or steal critical corporate data, according to the research company Gartner, Inc.

The report, obtained by The Mac Observer and issued this week, does not recommend outright the banning of such devices from office environments, but does make it clear that portable USB and FireWire-based products open up businesses to a whole range of risks and that the protection of sensitive information is more important than ever.

The report points out the wide range of such portable devices, including smart media cards, memory sticks, compact flash, keychain drives as well as portable MP3 players. Small portable storage products can bypass perimeter defenses like firewalls and introduce malware such as Trojans or viruses onto company networks, said the report.

"Companies are at risk of losing intellectual property and other critical corporate data," the report said. "Portable storage devices are ideal for anyone intending to steal sensitive and valuable data. Employees may also be responsible for losing data if they inadvertently mislay these devices."

Gartner recommends companies "forbid the use of uncontrolled, privately owned devices with corporate PCs." In addition, the company suggests the adoption of "personal firewalls to limit activity on USB ports", investigate products that can control ports selectively, and "consider employing mobile data protection products to encrypt corporate or sensitive data."

The report ends by telling businesses that they "must ensure that the right procedures and technologies are adopted to securely manage the use of portable storage devices like USB 'keychain' drives. This will help to limit damage from malicious code, loss of proprietary information or intellectual property, and consequent lawsuits and loss of reputation."

Recent Headlines - Updated May 27th

Wed,3:10 PM
How to Deauthorize All Devices in iTunes 12
Tue,6:35 PM
iKlip Grip: iPhone Stand and Selfiestick with Bluetooth Shutter
6:09 PM
ShowStoppers & MacTech Team Up for DevFocus at WWDC
3:40 PM
HiRise Apple Watch Stand is Beautiful, Well Engineered
2:58 PM
Firefighters Take on Blaze at Apple’s Former Sapphire Glass Factory [Update]
2:02 PM
Apple Watch Course: Go from Newbie to Pro and Build 14 Apps for $25
1:55 PM
Three Things You Didn’t Know TextEdit Could Do For You
1:26 PM
TMO Daily Observations 2015-05-26: Jony Ive’s Promotion, Cortana Coming to iPhone
10:25 AM
Hold on to Your Pants, Siri, Microsoft’s Cortana is Coming to iPhone
9:20 AM
Local Content Deals to Delay Apple’s Streaming TV Plans
5:26 AM
Apple Promotes Jony Ive to Chief Design Officer, Creates VPs for Hardware and UI Design
Sun,12:13 PM
MGG 554: Sleepy Macs Sometimes Go To Work
  • __________
  • Buy Stuff, Support TMO!
  • Podcast: Mac Geek Gab
  • Podcast: Apple Weekly Report
  • TMO on Twitter!