During a recent call with Kevin Prince, CTO of Perimeter E-Security, he suggested that with the new security vulnerabilities of mobility solutions comes great opportunities for security VARs in 2010. Kevin has mobile devices on his list of top 10 security threats in 2010, and explained his reasons to me last week.
Kevin says the industry is seeing worms written specifically for iPhones, and apps written to secretly track phone applications in order to capture personal data. I've talked before about the risk to users with Bluetooth-enabled devices, especially those who leave that technology activated.
Laptops have always faced threats, not only from cyber space but from thieves who simply swipe the equipment. Kevin also remnded me that USB drives can easily carry viruses and worms, are simple to lose or steal, and provide an excellent opportunity for disgruntled employees to steal data.
Overall, the recommendation from Kevin is for VARs to talk with their customers about creating management and access policies for mobile devices and introducing them to technology that can protect devices and data, further advancing their position as a trusted advisor.Want to learn more? Check out Kevin's full list of threats and then also register now for our free Lunch & Learn on the mobile revolution, Thursday, Feb. 11, at 1 p.m. Eastern.