Tag Archives: iOS

Drawers Filled with Deactivated Devices Don’t Delete Data

By Rob Patey

As people unwrap their shiny new smartphones and tablets this holiday season, a majority of their archaic devices will be destined for drawers and donation bins. Before these relics head to the mobile mausoleum, are you ensuring they don’t carry company secrets to the grave with them?

device_trashWhat do you do with your old smartphones and tablets? If you’re like my wife and I, you probably slip the last generation into a discrete junk drawer in case your newest tech takes a nose dive. The devices that were already in the drawer from the last culling then make their way to a worthy charity. Since I’ve always been an IT marketer, I know the dangers of leaving data on a dead device, so I ensure factory settings are restored before administering last rites. My wife, an IT neophyte, never thinks to take this crucial step despite the fact her smartphone carries data ten times more sensitive and regulated than the marketing materials on my device. It’s not her fault and the research shows she is far from alone.

Ho, Ho, Oh No!

Black Friday and Cyber Monday were dominated by mobile tech purchases, and current estimates from the Consumers Electronic Association show that 50% of people plan to make smartphones and tablets part of their Holiday shopping sprees. Each of these gorgeous new gadgets will inevitably send last year’s iPhones, Androids and Windows to the death drawer…if you’re lucky. In a poll conducted by Harris Interactive on behalf of Fiberlink at the end of the last holiday season, 68%of respondents said data leak protection was the last thing on their minds before their devices met the following fates:

  • 58% of respondents kept the device
  • 16% had the data professionally wiped
  • 13% turned the device into the service provider (without wiping the data first)
  • 11% donated the device to threw it away in the trash
  • 5% had the device securely destroyed
  • 9% other

Let’s assume for a second that the “other” responses actually had data protection on their minds before decommissioning their devices. This still leaves a large percentage of BYODers paying forward corporate connectivity credentials to Wi-Fi, email and any other content that can be accessed via mobile (which these days means all content). And rest assured all those devices that were kept for now, will meet one of the other fates when it comes time for spring cleaning.

Hope for Post-Holidays

Fortunately, this reckless abandon with company data does not have to be the norm. Corrective measures though require one part diligence on the part of the IT department and one part education for employees. Fiberlink’s Chief Security Officer, David Lingenfelter offers the following advice:

  1.  Notify Your IT Department. Once you receive a new device and want to use it for your company’s BYOD program, send your IT department a note and let them know you will be swapping devices.
  2. Transfer Corporate Materials to Your New Device. Have your IT department quickly transfer all corporate materials from the old device to the new device through their mobile device management (MDM) platform. This generally involves enrolling in an MDM solution which pushes down corporate e-mail and Wi-Fi profiles, applications and corporate documents. If you don’t have an MDM solution, ask your IT department to assist with transferring data, although don’t be surprised if IT is no longer your best friend since this is a very time consuming process.
  3. Extract Personal Data from Your Device. Now that your corporate data has been transferred to the new device, remove and save all personal files. This can be accomplished with the native tools and back-up services of the operating system or the manufacture (e.g., Apple’s iCloud and Google Drive).
  4. Erase all Remaining Personal and Corporate Data. Fully decommission the old device by removing all personal and corporate data. Most devices have an option in the setting menu to perform a factory data reset which will wipe the data completely. This can also be accomplished remotely by an MDM platform. Note: In some tablets and smartphones, you should manually remove the storage card and use it in your new device or erase the data from it as well.

While seemingly simple, remember that corporations have more than one employee. If 74% of the company arrives on January 1st with requests for new device enablement, IT will need to shelve any other projects on their radar for the next few weeks. With mobile device management in play the identification of new devices is automatic as are the requests to enroll, enable and distribute content and apps. As the capabilities of mobile devices grow, the need for data vigilance grows exponentially faster.

Embrace a Zombie for a Healthy Marketing Jack

What to do when your list is exhausted and Halloween is approaching – embrace the Holiday for registrations that go through the roof. Concept and copy by moi. Execution by my very good design friends.

Zombie-Header-Eloqua

They shuffle mindlessly through the halls; satiating an unquenchable thirst for bandwidth off the corporate WiFi and gurgling a unison mantra for eeeeeemail and aaapps. They are your employees and they have been infected by the alluring glow of their smartphones and tablets .

The only thing standing between enterprise data security and the BYOD apocalypse is you – the IT Hero. And here are your weapons of survival!

MaaS360 Productions Proudly Presents
The BYOD Survival Zone

Starring 

BYOD_meaty_resources

MARVEL at meaty resources and templates field tested against the most gruesome of BYOD attacks!!!!

BYOD_bloody_good_reads

BASK in the bloody blogs boasting beat downs of BYOD infractions!!!!

 BYOD_terror_tubes

TURN-ON the terror tubes of m-zombie demise!!!!

BYOD_stories_of_survival

CHASE down the chilling case studies chastising the unchaste of BYOD!!!!

BATMAN 17 PREVIEW ART – U WRITE THE PANELS

Something wicked this way comes, but for now it comes in black & white. I received these two images today from DC Public Relations unveiling some of the action sequences for BATMAN 17.

Obviously they won’t give away the store this early, but I think it’s cool to see images before they reach the final production stage.We can obviously discern a few things from this….

  • Joker and Batman are in the cave, which makes Bruce arrogant or stupid with his statement the Joker doesn’t really know the identities of the Bat-Clan.
  • Joker’s face is still held on with a headband, so his face hasn’t come back.
  • OK, that’s all I got 

Since we don’t have dialog I will handle the chores. 

ENJOY!!!

BATMAN 17 PAGE

 

PANEL 1

BATMAN: I BOUGHT YOU SOMETHING FROM ADAMandEVE.com!

PANEL 2

BATMAN: THE WORLD’S FIRST ANTI-GRAVITY DILDO

JOKER: BUT WOULDN’T THAT JUST SHOOT UP INTO A WOMAN’S THROAT WHEN YOU TURN IT….

PANEL 3

JOKER: …ON

PANEL 4

BATMAN: SEE WHAT I DID THERE, YOU THOUGHT IT WAS A DILDO, BUT IT’S ACTUALLY A FLOGGIN’ ROBIN DETONATOR.

JOKER: THANK GOD, I WAS REALLY GETTING TIRED OF HAVING TO KILL THESE KIDS WHEN THEY GOT ANNOYING.

PANEL 5

JOKER: THIS IS A FAKE SMILE, I WAS REALLY EXCITED ABOUT THE DILDO.

BATMAN 17 PREVIEW

 

PANEL 1

JOKER: RED ROVER, RED ROVER, BATMAN COME OVER.

PANEL 2

JOKER: SO HOW MUCH IS AN ACTUAL CORD OF WOOD? IS  IT LIKE A CUBIT?

BATMAN: NO ACTUALLY A CUBIT IS SIMPLY THE LENGTH OF THE FOREARM. A CORD IS AN AREA OF MEASUREMENT.

PANEL 3

JOKER (OFF SCENE): ALL RIGHT, WELL HOLD THIS WHILE I GET A CALCULATOR TO FIGURE THIS OUT.

PANEL 4

BATMAN (OFF SCENE): CALCULATOR? THERE’S AN APP FOR THAT YOU KNOW?

JOKER: NOT IF YOU HAVE A WINDOWS 8 PHONE. WELL THEY’LL SELL YOU ONE, BUT IT ONLY WORKS WHEN THE MOON IS FULL  AND LINDSEY LOHAN IS IN HEAT.

PANEL 5

BATMAN: WINDOWS 8 PHONE, YOU SERIOUS? I’VE HAD RESERVATIONS ABOUT KILLING YOU IN THE PAST. BUT IF YOU’RE SO CRAZY YOU WOULD BUY AN OPERATING SYSTEM THAT’S WORSE THAN WINDOWS ME, YOU DESERVE A LITTLE INTERNAL BLEEDING.

PANEL 6

JOKER: THE GUY AT VERIZON SAID IT WAS JUST AS GOOD AS AN iPHONE AND THE BATTERY LIFE IS 20 MINUTES LONGER. IS THERE AN AMBULANCE APP?

BATMAN (OFF SCENE): YES, BUT ONLY ON iOS.

All images courtesy of DC entertainment. Words, not so much. 

 

 

The ABCs of Mobile Device Management

Here’s a Whitepaper/ebook (whatever) I created to serve as a primer for teaching IT neophytes the basics of enterprise mobility and mobile device management.

I will link up the full paper when it finally stops delivering leads for MaaS360 by Fiberlink. Art was provided by the very talented Mr. Greg Leighton.

The ABCs of Mobile Device Management

ABCs of Mobile Device Management

Securely managing mobile devices, apps and docs doesn’t have to be hard;
in fact, with MaaS360, it’s as simple as ABC…

Android, BYOD, Cloud

We cover all the essentials from A-Z

  • A is for Android, fragmentation is scary
  • B is for BYOD, you can’t control what they carry
  • C is for Cloud, used for every device

To get to Z, download your copy of the ABC’s of Mobile Device Management today and see just how simple it is to deploy, secure and manage the latest smartphones and tablets.