Last month, I wrote an article on the Emergence of Smartphones as a Key Platform for Security Industrythat discussed the growing ubiquity of smartphones within the workplace and the increasing number of mobile apps that have the ability to collect information from its environment such as video streams, audio streams, indoor location and information from other sensors.
In stark contrast to the focus on the information that mobile devices may capture, store and provide intelligence back to an organization, this article focuses on what intelligence others might be able to capture about your organization by accessing an employee’s mobile device in an unauthorized manner.