Picking Blackberries – Why Mobile Technology Needs More Security.

By: Thomas Hunter

Data security, especially on mobile devices like cell phones and Blackberries, needs an increase in the level of seriousness given, especially with people doing shopping and business transactions online, and with the lines of technology blurring so much between devices. For instance, email doesn’t have to be sent on a computer anymore. Cell phones can be used for email and text messaging. Blackberries combine many functions of computers and cell phones, and are becoming quite common in the business world and for personal use as well.

The need for further security is exemplified in the passing of a California law. This law requires businesses to report to consumers’ breaches in their data security resulting in the loss of personal information, like names, social security numbers, driver’s license numbers, debit card and credit card numbers, and California state ID card numbers. Some companies have been in the news in recent years when these security breaches occurred. Companies involved include Bank of America, DSW Shoe Warehouse, Household Bank, LexisNexis and even MasterCard and Visa through a third party company. However, it may not be that there are more security breaches these days. It may simply be that the companies are now reporting security breaches that they ignored in the past. Currently the law requires that all businesses that do business in California report all security breaches. Most companies are reporting this information to all of their customers rather than just those who live in California to err on the side of safety.

The situation is serious enough that Congress in 2005 began to look at enactment of a federal law to apply the same requirements on the entire nation. One such bill was introduced by Senator Diane Feinstein and is patterned after the California law. In addition, several states have enacted very similar laws that require businesses and government agencies to report security breaches quickly. Currently the states of Georgia, Minnesota, Montana and North Dakota have these laws and other states are considering them.

Why should security of mobile technology be of such concern? The same reason that your computer security should be of concern. Unscrupulous individuals – crooks in other words – if they get a hold of your personal information, this can make you the victim of fraud or identity theft. With cell phones crooks “clone” cell phone numbers and sell them as clean and untraceable back to the user. These people make calls on your cell phone account without even having your phone in their possession, and you get the bill. People who commit identity theft can buy cars in your name, get credit cards, or use your credit or debit card. They have been known to clean out people’s bank accounts quite quickly indeed. In addition to the loss of money, it can take months to straighten out the identity theft mess and get your personal credit rating back in the same shape it was in before the incident happened.

The public deserves protection from the dangers imposed by security breaches, whether that protection is given to them by government agencies or by businesses themselves doing the right thing. Everyone involved in collection and dissemination of confidential information needs to take extra care to be certain that such information does not get into the hands of those who would misuse it. Individuals also need to take steps to increase their own personal security. Memorizing passwords and PINs, personal identification numbers, and not writing them down is a good first step. Imagine having the PIN for your checking account in your wallet, along with your debit card and having both stolen. A thief would have immediate access to your money, but if you had the PIN memorized and not written down, the money would be safe. Also take care with important numbers like bank account numbers, credit card numbers, and your social security numbers. Crooks intent on committing fraud or identity theft love to get a hold of those numbers and many of them can do you financial harm, so keep them safe. Also, be careful of who is listening when speaking on a cell phone and giving out important numbers. That stranger could be an identity thief, so take care when you speak.


Massive Profits are being made from Online Auctions. Learn how to harness the Money Making Power of eBay from a Real Powerseller. Visit our daily blog, "Auction Profit Tips", get a FREE gift and learn dozens of eBay money making tips, tricks and hints. bzh45qr
Article Source: http://AuctionProfitTips.NET

© 2006 Article Directory - All Rights Reserved.