A lost PDA is an invitation to a thief, and if it holds confidential company information or sensitive customer
data, it's even more valuable to a malicious user.
Also, like laptops, PDAs should be used out of sight of "shoulder surfers" and wandering eyes in places like airport lounges, hotel lobbies or coffee shops. PDA cases shouldn't have company logos, identifying marks or personal information to further entice potential thieves. If possible, the device should have as little company data or information as possible, which makes them less valuable if lost or stolen.
One PDA, the BlackBerry, has additional security features that can be turned on via the BlackBerry Enterprise Server. The system administrator can send signals to the device to change passwords or even lock out the device if it's stolen. BlackBerry also offers integration with RSA's one-time password tokens (OTPs) and smart cards for two-factor authentication.
Palm devices have a number of products available for providing secure logins and locking the device in case of theft. There are also specially designed cables and locks available for physically securing the device. All of these products are third-party add-ons to the Palm.
Here are some other tips for PDA security:
PDA security is still evolving; in some ways it resembles laptop security with encryption and lock-out capabilities. If PDAs become more of an attack vector, strategies for securing them will have to change.
For more information:
Dig deeper on Handheld and Mobile Device Security Best Practices
Related Q&A from Joel Dubin, past SearchSecurity.com expert
The security of RFID chips and smart cards may not be fully mature, but there are best practices to keep facilities safe. Identity and access ...continue reading
Picture passwords for mobile device security aren't a new idea, but they have been recently improved. Identity and access management expert Joel ...continue reading
Hacked smart cards are a large potential threat to enterprises that utilize them. Learn how to thwart smart card hackers.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.