PG&E Public Safety Power Shutoff is scheduled for Wednesday, October 9th at 4 AM for much of Northern California. For planning purposes, PG&E suggests customers prepare for outages that could last several days. Please take appropriate actions to ensure the safety of your systems if you are in a targeted shutdown area. See if your area is affected here...

iPhone “Backdoor”? It Already Exists! Why Your Company Needs It

March 8th, 2016 by admin

Close up of a woman with pink fingernails using an iPhone while carrying a black bag

February's big story in the tech world was the conflict between Apple and the FBI over the creation of a "backdoor" to retrieve encrypted data on iPhones. The government is looking for any clue as to what—or, more specifically, who—motivated Syed Farook, along with his wife, to gun down his San Bernardino co-workers at an office party. Meanwhile, Apple CEO Tim Cook, along with other high-profile tech leaders, warn that the existence of such an "anti-encryption key" could become a slippery slope—ultimately threatening individual privacy as well as the security of all virtually-protected data, personal or business.

Apple steadfastly refuses to comply with the FBI's court order, and the battle is likely to reach the Supreme Court. And if the Court's pivotal ninth seat remains unfilled due to political gridlock, the whole issue could remain undecided for quite awhile.

Finding the Facts

In the midst of this landmark security vs. privacy brouhaha, one key fact of the case is being underreported: The iPhone 5c the FBI wants to unlock was Farook's business phone, issued to him by the San Bernardino County Health Department. He destroyed his personal phone—which he most likely used to actually discuss the terror plot—before the couple's fatal shootout with police.

How could this highly-vocal Apple-FBI standoff have been averted in the first place? By using an encryption backdoor that already exists—completely legal, and, for businesses, absolutely necessary: mobile device management (MDM) software.

MDM allows users to enjoy the same mobile productivity—apps, email, documents, file-sharing—that they'd expect from an onsite network, while enabling IT administrators to ensure every device remains compliant with company security standards (configuration settings, updated security patches, and limiting unauthorized use of the device).

More importantly in this case, MDM can, if necessary, bypass a security passcode to regain access to the company-issued device. Ironically, San Bernardino County had already contracted with an MDM vendor, but simply hadn't gotten around to installing the software on mobile equipment in Farook's department, due mainly to the lack of a formal MDM implementation policy.

Your MDM Solution? Choose Wisely

As mobile computing and BYOD become increasingly common in the modern workplace, MDM is essential for every company. You'll find products from a slew of vendors, large and small, at competitive prices, but here are some key points to look for:

  • Ease-of-use (look for free trials of MDM products)
  • Full compatibility with both iOS and Android platforms
  • Functionality across multiple devices and wireless carriers
  • Seamless integration of all company-used apps (email, data, SaaS)
  • Pricing structure (per device or flat rate)

Choosing the right MDM solution—and effectively implementing it across your organization—is another IT challenge facing your company today. We can help.

Posted in: Security