• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia

Trendingnow

1

The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises

2

Despite having a $165 million net worth, Scarlett Johansson says work-life balance doesn’t exist—and the first step to success is admitting that

3

Nearly 50,000 Lake Tahoe residents have to find a new power source after their energy source looks to redirect lines to data centers

1

The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises

2

Despite having a $165 million net worth, Scarlett Johansson says work-life balance doesn’t exist—and the first step to success is admitting that

3

Nearly 50,000 Lake Tahoe residents have to find a new power source after their energy source looks to redirect lines to data centers

Online security goes mobile

By
Stephanie N. Mehta
Stephanie N. Mehta
Down Arrow Button Icon
By
Stephanie N. Mehta
Stephanie N. Mehta
Down Arrow Button Icon
January 11, 2010, 10:00 AM ET

“Unfettered” shouldn’t mean unconcerned about mobile hacks.

By David Jevans, CEO, Iron Key



Jevans: Mobility can mean more chances for security breaches. Photo: IronKey.

It’s a mobile, mobile mobile, mobile world: More and more of us are using laptop computers, Apple (AAPL)  iPhone’s, Research in Motion (RIMM) BlackBerrys, USB flash drives and other portable computing and storage devices in our day-to-day lives.

Many freelancers and consultants bring their laptops to Starbucks coffee shops, and treat it as their virtual office.

And it’s not just consumers and consultants who are adopting a mobile computing lifestyle.  Companies and government agencies are trying to become more agile and efficient, and increasingly are relying on productivity gains that come from a more mobile workforce.

According to industry analyst firm IDC, there will be over 1 billion mobile workers by 2011.  That means there will be at least 1 billion portable computing and storage devices that will contain work and personal data.  The overall productivity gains sound impressive, but have you ever thought about what could happen if one of those portable computing or storage devices were to be lost or stolen?

When you think about what is stored on your laptop, flash drive or smartphone, you might start to think twice about how you can improve the security of that information in case of loss or theft. Intellectual property, customer data and company financials are the top three concerns for data loss by companies.

The Ponemon Institute recently completed a survey of over 900 corporate users of information technology in US companies, and asked them about data loss from mobile computing devices:

  • 43 percent have lost a device that contained company data.
  • 32 percent of those people didn’t report the loss or theft in a timely fashion.
  • USB flash drives (“thumb drives”) were the top item that was lost (33 percent), followed by CDs/DVDs (31 percent), BlackBerry’s or iPhone’s (20 percent) and laptop computers (5 percent).

Why you should be worried

It is human nature to think “it won’t happen to me.”  But the reality is that losing mobile devices happens more often than we think, and the impact to a company’s reputation and finances can be severe.

In October 2009, a laptop was stolen from Halifax Health.  That laptop contained the personal information of 33,000 patients.  Halifax Health had to notify all of those patients, and tell them to sign up for credit monitoring services.

Earlier in the month, the Virginia Department of Education announced that an employee had lost an unencrypted USB flash drive containing the personal information of 100,000 current and former students of Virginia Tech.  The State treated it as a serious data breach, and had to expend considerable resources to contact all 100,000 of those people.

Even the military can make mistakes. Lost flash drives from US military servicemen have been found for sale in street markets in Iraq.  In December 2009, a laptop was stolen from inside the United Kingdom’s Ministry of Defense.

It’s not just a businesses reputation that is at stake.  In January 2009, the U.S. Veterans Affairs Department agreed to pay $20 million to settle a class-action lawsuit filed by veterans over the risk of potential identity theft, when a VA laptop PC that contained their sensitive information was stolen in 2006.

Security firm McAfee estimates that losses of intellectual property, through lost and stolen devices, as well as Internet attacks, cost companies up to $1 trillion per year.

Can you keep the loss of data private?

If a private citizen has their laptop or smartphone stolen, they may simply suffer the expense of replacement and the hassle of restoring data from a backup.  However, employees of companies face a different set of circumstances if that lost device contains customer data.

California was one of the first states to pass a law, SB-1386, which requires companies to notify consumers should their data be lost or leaked.  Similar legislation has now been enacted in many other states.  In fact, in a survey of 323 IT managers and top executives, 79 percent of respondents stated that every day they work with data that, if lost, would by law require their organization to publicly notify potential victims.  Federal lawmakers are now discussing mandating data breach notifications as a Federal law.

The best way to protect yourself and your data, is with the use of encryption.  Encryption is a technology that scrambles the data on your laptop, phone or thumb drive, so that if the device is lost or stolen, only someone who knows the correct password can unlock the device and unscramble the data.  Encryption is built into the Apple Mac OSX.  It’s called FileVault, and it’s very easy to use.

Microsoft’s Windows 7 operating system also offers built-in encryption, called BitLocker.  There are also encryption options for many smartphones, and USB thumb drives like IronKey that offer embedded hardware-encryption capabilities.

Despite this wide availability of encryption technology, a recent report by InformationWeek showed that only 38 percent of companies encrypt data on portable devices.  This is an attitude that’s got to change.

Encrypting our mobile computing devices is something that companies and individuals alike must start to do.  Just like using a seatbelt and airbags, we hope that something bad won’t happen to us, but we’re all very glad to have the protection if something goes wrong.

Jevans is CEO of IronKey, a Los Altos, Calif.-based maker of secure flash drives. He has spent more than 10 years in senior roles at Internet security concerns.

About the Author
By Stephanie N. Mehta
See full bioRight Arrow Button Icon

Latest in

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in

Harrison Ford wearing a bow tie
SuccessWealth
Before ‘Star Wars’ made him a multimillionaire, Harrison Ford struggled to make ends meet—so he spent 15 years working a trades side-gig
By Preston ForeMay 15, 2026
26 seconds ago
Jenn Hyman reflects on the highs and lows of running Rent the Runway for almost two decades
NewslettersMPW Daily
Jenn Hyman reflects on the highs and lows of running Rent the Runway for almost two decades
By Emma HinchliffeMay 15, 2026
2 minutes ago
US hedge fund manager Bill Ackman, CEO of Pershing Square Capital Management, speaks during the 29th annual Milken Institute Global Conference at the Beverly Hilton in Beverly Hills, California on May 4, 2026.
InvestingMicrosoft
Bill Ackman has been quietly buying Microsoft since February, when AI fears were dragging the stock
By Eva RoytburgMay 15, 2026
14 minutes ago
newsom
Personal FinanceCalifornia
Gavin Newsom blasts Trump and Bessent as ‘dumb and dumber’ while unveiling $350 billion state budget
By Trân Nguyễn and The Associated PressMay 15, 2026
24 minutes ago
new mexico
North AmericaNew Mexico
New Mexico is raking in oil profits from Iran War, gaining $59 million for every $1 added to the price of a barrel
By Morgan Lee and The Associated PressMay 15, 2026
29 minutes ago
boeing
LawBoeing 737 Max
Jury awards $49.5 million to family of 24-year-old who died in Boeing 737 Max crash in 2019
By Rio Yamat and The Associated PressMay 15, 2026
42 minutes ago

Most Popular

The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
Politics
The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
By Jake AngeloMay 12, 2026
3 days ago
Despite having a $165 million net worth, Scarlett Johansson says work-life balance doesn’t exist—and the first step to success is admitting that
Success
Despite having a $165 million net worth, Scarlett Johansson says work-life balance doesn’t exist—and the first step to success is admitting that
By Preston ForeMay 13, 2026
2 days ago
Nearly 50,000 Lake Tahoe residents have to find a new power source after their energy source looks to redirect lines to data centers
Travel & Leisure
Nearly 50,000 Lake Tahoe residents have to find a new power source after their energy source looks to redirect lines to data centers
By Catherina GioinoMay 12, 2026
3 days ago
The airplane fuel shortage is a myth propagated by airlines who want to cancel unprofitable flights, says private jet CEO
Energy
The airplane fuel shortage is a myth propagated by airlines who want to cancel unprofitable flights, says private jet CEO
By Jim EdwardsMay 14, 2026
1 day ago
Current price of oil as of May 14, 2026
Personal Finance
Current price of oil as of May 14, 2026
By Joseph HostetlerMay 14, 2026
1 day ago
Steve Jobs used a 'beer test' for interviews at Apple—if he didn’t want to drink with you, you didn’t get the job
Success
Steve Jobs used a 'beer test' for interviews at Apple—if he didn’t want to drink with you, you didn’t get the job
By Orianna Rosa RoyleMay 14, 2026
1 day ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.