iPhone Kill Switch: How Effective Is It? - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Comments
iPhone Kill Switch: How Effective Is It?
Newest First  |  Oldest First  |  Threaded View
asksqn
50%
50%
asksqn,
User Rank: Ninja
7/30/2015 | 3:45:01 PM
Kill Switch enabled by default should be a reality
Given the dearth of users who are either unwilling or unable to lock their phones, the only way I can visualize the kill-switch being in the 90% effective percentile is if the new models being manufactured have it enabled by default.
impactnow
50%
50%
impactnow,
User Rank: Author
7/30/2015 | 1:55:52 PM
Re: Control is the key...

It is very scary phones should be treated just like laptops were before they can provide employees with access to proprietary information and usage and access should always be monitored. Not having the ability to remotely access a phone is a critical security error for companies.

vnewman2
50%
50%
vnewman2,
User Rank: Ninja
7/28/2015 | 12:38:31 PM
Re: Control is the key...
@SachinEE - wow that's terrible! And scary - something I haven't really considered as a possibility personally, but you just never know these days. How do companies that don't use Exchange administrate mobile devices? I can't imagine not having a way to do a administrative wipe of, at the very least, the company's information, ie, email - not the entire phone's contents because the line is blurred between work and personal and they are often on the same device. But what if you have a disgruntled employee running around with company info on their phone. Let's say one day they just stop coming to work (happened here recently) - someone in the firm needs the ability to cut them off - forget about it being stolen - there's nothing worse for company data than an irrate former employee.
SachinEE
50%
50%
SachinEE,
User Rank: Ninja
7/28/2015 | 12:53:00 AM
Re: Control is the key...
@vnewman: yes. After my phone was stolen all higher employees had to digitally sign their phones in case they are lost so that the company data can be erased. The second case of my phone being stolen was deliberately planned through a series of people. It were corporate stealing. Ironically my phone was returned to me after all the company data was copied from it. However when I ran a full diagnostics I came across software installed in the phone that records keystrokes and whenever on WiFi sync's data to a remote server. Terrible example of corporate stealing.
SachinEE
50%
50%
SachinEE,
User Rank: Ninja
7/28/2015 | 12:47:18 AM
Re: Control is the key...
I agree. The killswitch is necessary. I've had two phones already pickpocketed on my way to office and that had my presentation in it. Terrible day explaining to the boss. Anyway I believe that Synching is necessary whenever the phone is hooked to a WiFi banding. The killswitch should be present on every phone in my opinion.
Angelfuego
50%
50%
Angelfuego,
User Rank: Ninja
7/27/2015 | 8:29:29 PM
Re: Control is the key...
Reading your article encourages me to set up the kill switch on my phone. You were also wise to set up the remote erase and lock on your phone. Quick and wise thinking on your behalf.
Angelfuego
50%
50%
Angelfuego,
User Rank: Ninja
7/27/2015 | 8:27:05 PM
Re: Control is the key...
I am sorry to hear that your phone was stolen. I would have been in panic mode. My phone holds such personal information. I am glad that the thief can only use it as a paperweight now.
impactnow
50%
50%
impactnow,
User Rank: Author
7/27/2015 | 3:53:37 PM
Re: Control is the key...
A lot of the antivirus software for mobile apps now has a Killswitch option where you can wipe your phone clean if it's stolen or lost. The one I used recently I love me to login on the website and wipe the phone if needed . This sounds like a good option for enterprises whose employees use smart phones for business . Enabling a remote administrator to wipe the phone clean offers maximum protection .
vnewman2
50%
50%
vnewman2,
User Rank: Ninja
7/27/2015 | 1:42:48 PM
Control is the key...
I feel like if you are using your iPhone as a business phone, your company should be using a more sophisticated means of remotely disabiling your device than just the built-in kill switch.  My firm uses certificate-based authentication for Exchange 2010 and although I understand some small businesses obviously do not have Exchange servers, it seems really risky to me not to have an enterprise-managed security feature on any device that can leave the firm.

 


The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Slideshows
10 Cyberattacks on the Rise During the Pandemic
Cynthia Harvey, Freelance Journalist, InformationWeek,  6/24/2020
News
IT Trade Shows Go Virtual: Your 2020 List of Events
Jessica Davis, Senior Editor, Enterprise Apps,  5/29/2020
Commentary
Study: Cloud Migration Gaining Momentum
John Edwards, Technology Journalist & Author,  6/22/2020
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll