& many more
and many more
Why Should I Block Cell Phones from Connecting to Computers?
The use of personal cell phones in the workplace is not just a distraction, they are also a high-risk device that needs to be addressed as part of your endpoint security policy.
Data security risks of cell phones
- Data Exfiltration: Unless you assign read-only access to mobile devices, employees can connect their phones to their workstations and illicitly transfer data to their smartphone’s microSD card or internal storage.
- Mobile Malware: Worms, trojans, and other malicious software can be unknowingly transferred to and from mobile devices. All it takes is an employee with Full Access permissions to plug their compromised device into their computer for the attack to begin.
How to Protect Data Against Mobile Devices With AccessPatrol
- Disable Bluetooth on workstations to prevent wireless data transfers to cell phones
- Block cell phones, iPods, PDAs, and other mobile devices from connecting to computers
- Monitor device reports and removable media file transfer logs for suspicious behavior
- Provide employees with alternatives for charging their phones such as USB ports in wall outlets and power bars