Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

MicroSD card security

Posted on 2010-09-07
2
Medium Priority
?
545 Views
Last Modified: 2012-06-27
Hi

We are running BES 4.1.7

Most of our handhelds now have MicroSD cards. Users tend to store various photos etc on here.

I'm worried that:

i) Someone could remove the MicroSD card from a device but leave the device. This way, the user wouldn't know til much later they had lost the card

ii) Someone could steal the whole device inc. MicroSD

Either way, the 3rd party has access to the data on the MicroSD.

Does anyone know how to set it up so that if the MicroSD is removed from the handheld it can't be reused?

At the same time, can genuine users copy data off when they swap their handheld?
0
Comment
Question by:Joe_Budden
2 Comments
 
LVL 3

Expert Comment

by:oneofonex1
ID: 33621373
i think the short answer is no. theres no way to protect your micro sd. depending on the device there should be apps that will allow you wipe data.
0
 
LVL 3

Accepted Solution

by:
kam_uk earned 2000 total points
ID: 33622327
http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB11970

"How to configure an IT policy for encrypting files on a media card"

This is what we use - it encrypts the data on the card so that no one else can read it.
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It still surprises me how many businesses have many of their staff constantly away from the office needing reliable Internet, and without realising it, the answers been in their pocket the whole time! I’m talking, of course, about the phenomenon …
I've already touched on keyboard shortcuts that can be used in a BlackBerry to make navigation much more easy but there are also another set of commands which are hidden for different reasons. Standard users won't need these unless under exceptional…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Suggested Courses

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question