A lost PDA is an invitation to a thief, and if it holds confidential company information or sensitive customer data, it's even more valuable to a malicious user.
Also, like laptops, PDAs should be used out of sight of "shoulder surfers" and wandering eyes in places like airport lounges, hotel lobbies or coffee shops. PDA cases shouldn't have company logos, identifying marks or personal information to further entice potential thieves. If possible, the device should have as little company data or information as possible, which makes them less valuable if lost or stolen.
One PDA, the BlackBerry, has additional security features that can be turned on via the BlackBerry Enterprise Server. The system administrator can send signals to the device to change passwords or even lock out the device if it's stolen. BlackBerry also offers integration with RSA's one-time password tokens (OTPs) and smart cards for two-factor authentication.
Palm devices have a number of products available for providing secure logins and locking the device in case of theft. There are also specially designed cables and locks available for physically securing the device. All of these products are third-party add-ons to the Palm.
Here are some other tips for PDA security:
PDA security is still evolving; in some ways it resembles laptop security with encryption and lock-out capabilities. If PDAs become more of an attack vector, strategies for securing them will have to change.
For more information:
Dig Deeper on BYOD and mobile device security best practices
What's behind the drop in costs? How can a business spend less on mobile devices over their lifetime? SearchMobileComputing.com caught up with Phillip Redman, Gartner's research vice president, to find some answers.
Related Q&A from Joel Dubin
Learn about the purpose of CAPTCHA challenges that enable websites to differentiate bots from authentic users to stop spammers from hijacking forums ... Continue Reading
Proper planning is at the top of the list for single sign-on best practices, but it's important to get enterprise SSO implementations off to a good ... Continue Reading
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.