The Evil Corporate Secret Stealing iPods Are Back!!!

from the not-this-again dept

It seems that every few months, some security company wants us to believe that iPods are some evil security threat to companies, as employees are sneaking them in and sneaking out precious trade secret info. It started about a year ago with a Gartner report, which was quickly followed by rumors that the UK military was banning iPods (later denied). A few months later, a security company came out with a similar warning. So, it really shouldn’t be any surprise to hear yet another security company screaming about how companies have no idea the threat the iPod represents. Apparently, this security company doesn’t realize just how many people now carry USB hard drives on their key chains, or (more importantly) the fact that just about anyone who works at a computer these days has access to this (ooooh! scarrrrry!) thing called “the internet” which lets them send data outside the company walls to almost anywhere they want!

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “The Evil Corporate Secret Stealing iPods Are Back!!!”

Subscribe: RSS Leave a comment
Anonymous Coward says:

What a bunch of numpties

It would make sense, in a completely locked down environment, to include mp3 players in the list of banned items. But if you’re not blocking the internet and searching everyone for floppies, CDR’s, thumbdrives and every other conceivable storage mediium, there’s no point getting excited about iPods.

Reality Check says:

Re: What a bunch of numpties

There are very few corporate environments that implement strict security standards. In the typical scenario, intellectual property is protected using file and folder-level access control and auditing.

It is best for an organization to lock down the data itself, instead of limiting the use of portable data storage devices. For example, instead of keeping the pool wide open and protecting the water from being taken by probiting buckets, just lock the pool instead.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...