A lost PDA is an invitation to a thief, and if it holds confidential company information or sensitive customer...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
data, it's even more valuable to a malicious user.
Also, like laptops, PDAs should be used out of sight of "shoulder surfers" and wandering eyes in places like airport lounges, hotel lobbies or coffee shops. PDA cases shouldn't have company logos, identifying marks or personal information to further entice potential thieves. If possible, the device should have as little company data or information as possible, which makes them less valuable if lost or stolen.
One PDA, the BlackBerry, has additional security features that can be turned on via the BlackBerry Enterprise Server. The system administrator can send signals to the device to change passwords or even lock out the device if it's stolen. BlackBerry also offers integration with RSA's one-time password tokens (OTPs) and smart cards for two-factor authentication.
Palm devices have a number of products available for providing secure logins and locking the device in case of theft. There are also specially designed cables and locks available for physically securing the device. All of these products are third-party add-ons to the Palm.
Here are some other tips for PDA security:
PDA security is still evolving; in some ways it resembles laptop security with encryption and lock-out capabilities. If PDAs become more of an attack vector, strategies for securing them will have to change.
For more information:
Dig Deeper on Handheld and Mobile Device Security Best Practices
Related Q&A from Joel Dubin
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ...continue reading
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well ...continue reading
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.