Until someone invents an invisible tethering device, there is the chance you could leave your fancy new iPhone on a table somewhere and walk off. It sits there, its fingerprint resistant, 960-by-640-pixel resolution display shining tantalizingly. The temptation is too strong. Somebody nabs it and runs. You return, but it’s too late. Your beloved device is in the hands of another.
Apple’s current technology offers the phone-scorned a few options in this scenario, like remotely wiping your sensitive data. New Apple patents take anti-theft technology a step further, helping you actually identify and catch the thief. You may not own an iPhone, but business data security should be a growing priority. Look for technologies like these from Apple from your smart phone provider soon:
· Record the voice and take photos of the current user without their knowledge
· Geotag photos, find distinguishing landmarks to determine the phone’s location
· Activate the accelerometer determine what type of transportation the thief is using
· Alert the owner if someone uses the phone
· Backup data and information remotely BEFORE wiping (current wipe feature does not offer backup)
· Lock certain features of the phone
· Determine unauthorized users by their heartbeat
Will advances in smartphone security keep up with the overall advances in smartphone technology? With the ubiquity of mobile devices in the business market, hopefully they will so that your business’s information security is not compromised by a smartphone breach.