PCs can be configured to share files and to give Bluetooth users access to a shared directory. Use this feature cautiously, and set the PC software to prompt the user when it receives files or address book information. Without proper settings, another Bluetooth user could send files that automatically execute on the receiving computer, opening the door to virus and worm infections, or Trojan executables. Before creating a trusted relationship,...
one Bluetooth device can require another to authenticate -- via a PIN -- and also use encryption while transferring all information. Make this a requirement for all handheld devices that connect to your network, or store sensitive corporate information.
FIVE BLUETOOTH SECURITY BASICS
Step 1: Learn the lingo
Step 2: Disable devices
Step 3: Authentication and encryption
Step 4: Acceptable use
Step 5: User education
ABOUT THE AUTHOR:
|Mathew Schwartz is a freelance writer, editor, and photographer based in Paris, France. He regularly contributes information security and corporate compliance stories to Enterprise Systems, Information Security magazine, and IT Compliance Now. His work also appears in numerous other publications, including the Times of London and Wired News. Other recent work includes a 235-page usability report on the world's top 10 intranets, coauthored for the Nielsen Norman Group. Corporate writing clients have included life-insurance firm SBLI, and Intel.|