DTG News and Else
The Design Center / DT&G & Else / NEWS ITEM  

Cell Phone: At Risk

4.2 million vulnerable to ID Theft

According to the findings of a survey by endpoint data protection security experts, Credant Technologies, 80% of phone users store information on their phones that could easily be used to steal their identities. The research surveyed 600 commuters at London railway stations about their mobile phones, typical usage and the types of sensitive information stored on them. The results were horrifying :
Photoshop Link 16% have their bank account details saved on their mobile phones
Photoshop Link 24% their pin numbers and passwords
Photoshop Link 11% keep social security and inland revenue details
Photoshop Link 10% store credit card information
Photoshop Link alarmingly 40% naively fail to protect their devices with a password

Further investigation reveals the information stored is not restricted to personal details as most users also use their personal devices for business use :
Photoshop Link 99% of people use their phones for some sort of business use even though 26% have been instructed by their employer not to do so
Photoshop Link 35% receive and send business emails
Photoshop Link 77% keep business names and addresses
Photoshop Link 30% use them as a business diary
Photoshop Link 17% download corporate information, such as documents and spreadsheets
Photoshop Link 23% store customers information

Someone else could become YOU

When you consider that 4 out of 10 people are not password protecting their devices, it makes many millions of users seriously exposed to the trappings of mobile phone criminals and opportunists who can use this information to clone someone's personal, or even corporate, life.

According to Paul Huntingdon Public Sector Director at Credant Technologies and adviser to many Government departments and large corporations, "Once you have access to someone's emails, passwords, birthdays, business diary, documents, children's names and pets you can easily masquerade as that person, sending out emails under their name, read all their corporate data and get to see every personal detail of their life. People are ignorant to how easy a professional thief could take over their life and effectively destroy it. It is therefore imperative that all mobile phone users, even with the most basic handset, password protect and encrypt them."

Steve Gold, Telecoms journalist and IT expert adds "People can be destroyed when their phone gets into the wrong hands - for example blackmail, abuse and threats, just by leaving it accessible without password protection. Imagine how easy it would be to assume or destroy the life of a colleague just by stealing their phone if it was the company chairman's phone you could send emails from him announcing his resignation a practical joke with serious consequences."

* The figure of 4.2 million UK mobile phone users open to identity theft was extrapolated from figures obtained from the Department for Transport which showed there are 70 million phone users in the UK and according to the Credant Technologies survey, 40% are not password protected, this figure was times by the average of people leaving sensitive details on their mobile phones which is: 15% who store highly sensitive data, such as bank account details, 24% store PIN numbers and passwords, 11% store social security details and 10% store credit card information which comes out at 15.25% of phone users who are leaving highly sensitive data on their phones that could be used to steal their identity. Ergo 40% x 15% x 70 million = 4.2 million phones

CREDANT Technologies
      CREDANT Technologies is the market leader in endpoint data protection solutions that are critical components of an endpoint protection platform. CREDANT's data security solutions preserve customer brand and reduce the cost of compliance, enabling business to "protect what matters." CREDANT Mobile Guardian is the only centrally managed endpoint data protection solution providing strong authentication, intelligent encryption, usage controls, and key management that guarantees data recovery. By aligning security to the type of user, device and location, CREDANT ensures the audit and enforcement of security policies across all computing endpoints. Strategic partners and customers include leaders in finance, government, healthcare, manufacturing, retail, technology, and services. CREDANT was selected by Red Herring as one of the top 100 privately held companies and top 100 Innovators for 2004, and was named Ernst & Young Entrepreneur Of The Year 2005. Austin Ventures, Menlo Ventures, Crescendo Ventures, Intel Capital, and Cisco Systems are investors in CREDANT Technologies. For more information, visit www.credant.com.

 

Return to &Else News & Views. . .

.

Participate in your Design Center

Lots of fun and information for all... don't forget, any community is only as good as the participation of its members. We invite your tips, tricks, comments, suggestions and camaraderie.

Learning, training, tips, tricks, and moreThe Design Bookshelf team reads and reviews the best books for the creative visual designer, desktop publishing practitioner and visual communicator. If you want to know it -- we'll show you the very best way to learn it... in the Designer's Bookshelf

Get more out of your computer: join a user group - There are computer clubs around the world called "user groups" where you find fellow computer users ready and willing to share a wealth of information. If you're not a UG member, you should be.. find a group at the User Group Network

Photoshop FAQ - Got a question? Get an answer: in the Photoshop 911 FAQ if you don't find the answer there, you can ask your question or send your problem to the Photoshop 911 Team

Advertise your products or services among these pages! Call: 540-433-8402 for details.