It all started when several persons aboard a Peugeot Partner, a Fiat Palio and a Mercedes Benz Sprinter van stormed armed and dressed in clothes of work in the firm located on Constituyentes 500 of that town in the Escobar partido and surprised the security guards and employees who were there.
After that, did enter a truck and began loading goods on him, and then living at least three hours in the place they fled in vehicles, not without error before suspending a computer believed contained the signature security camera files.
After take cognizance of the fact, members of the departmental coordination of investigations of Zárate-Campana began an investigation during which analyzed images of the place and the area.
cell-phone tracker |
There police officers along with Dr. Facundo Flores, owner of UFI specialized in investigations of crimes committed against the transport of cargo for the Department Judicial Zárate-Campana, moved and observed that within a site shed in Carhué to 4500 a truck similar to the one used was during the assault.
Therefore, place paved emergency and recovered the stolen goods for the logistics company, stopped five criminals aged between 31 and 50 years - featuring lush background, including piracy of asphalt, violent robberies and kidnappings--and seized the Sprinter, a Peugeot 505, various cell phones and clothing used in the illicit.The traditional desktop screen is no longer the only instrument of work. For some years, employees use their own smartphones and tablets to perform its functions. According to a Tech Pro Research study, 74% of companies already allow or plans to allow its employees to carry their own devices to the office.
Despite the benefits to the companies, as the improvement of communication with the workers when they are not in their job, must be aware of the challenges to the security of sensitive data in the era of the BYOD ('Bring Your Own Device'), the name that is known to this corporate trend.
The variety of devices used in the business environment and the consequent loss of control of information by the company, the many vulnerabilities of mobile devices or the possibility that a Web of criminal use smartphones as fake access point to access the corporate network are some of the main threats.
The National Institute for cyber security (INCIBE) has warned businesses of these dangers are facing when they adopt a BYOD strategy and has also offered some possible measures to prevent them.
So, if at the moment is you was going through head to ask workers that will eliminate your corporate email on your mobile phone, stop worrying. The best thing you can do is to follow the advice of INCIBE to better protect devices from your workers and ensure the confidentiality of your company's data:
It indicates a person who is responsible for the management of devices
You need to centralize the management of devices in a person of the Technology Department. If your company is small, you can hire an external service or one in the cloud.
It supports all platforms that can be
The company's Technology Department must ensure support for all devices and platforms that employees use in such a way that they can work effectively and safely.
Smartphone
Educated in safety
The first having to be aware of the vulnerabilities of their devices are the workers themselves. Therefore, INCIBE recommended to offer specific training so that they not navigating in certain pages and to be aware of the risks of installing third party applications.
Control patches and updates and prevents the geolocation
Update to maximize both applications and the operating system of devices that access the network is a basic premise: the old versions of Android are exposed to plenty of vulnerabilities. Disable the GPS is another advice that you can give to those employees who work in critical systems, so that they are located from the outside.
It preserves the security of your information
If an employee accessing relevant documents from your mobile phone, you can add an additional password or encrypt the device so that the ciberatacantes can bring that information.
Controls access to the most private information
It distributes (PIV) identification cards and restrict access to confidential information to those employees who do not need it for their daily work.
The BYOD does not fit all companies
Network critical, as the industrial control systems, it is not advisable that employees can use their own devices.
how to track a cell phone |
Our mobile leaves footprint, and options like Android Device Manager or ' Find my iPhone' for Android help us to find it easily. You can also take advantage of these options to control which devices are accessing our network and prevent that our information is spied on by third parties unrelated to the company.