" remote wipe Archives - LuxSci FYI Blog: Learn about HIPAA email encryption, secure email encryption, and more
LUXSCI

Posts Tagged ‘remote wipe’

Exchange ActiveSync (MobileSync) vs Good Old IMAP + SMTP

Monday, October 6th, 2014

Many years ago, it used to be that if you had a cell phone that had an email program included, you could configure using IMAP and SMTP to allow you to check email and send email…. just like how a desktop email program worked.

This is still the case, of course.  However, as far back as 1996, Microsoft introduced the first version of “ActiveSync”, a protocol designed to allow mobile devices supporting it to synchronize email, calendars, tasks, and contacts with Microsoft’s Exchange server.  ActiveSync has evolved over time, getting faster, offering support for use in every modern mobile device.  While ActiveSync was designed to work with the Exchange server, these days it also works with other non-Exchange services that can talk the “ActiveSync language,” e.g. LuxSci through its Mobile Sync service.

In general, ActiveSync is much better than using IMAP and SMTP, though there are a few small corner cases where IMAP may be better for you.  Below, we shall compare them from an end-user perspective … trying to shed some light on “which is better” from a practical point of view.

Read the rest of this post »

Encrypting the data stored on your iPhone/iPad with disk encryption

Tuesday, June 25th, 2013

Mobile devices are with us all the time … if you are a parent, you phone is probably at your side more than your kids.  With all the secrets of your life residing on your phone, protecting those against access should your phone be lost or stolen is important.  If you use your phone for work, then this may be critical. E.g. if you are a doctor or nurse and use your phone for access to email or other data that may contain patient-related information, then HIPAA essentially requires that easily-lost mobile devices like this are locked down and encrypted.

This article explains how to protect yourself if you have an iPhone, iPad, or iPod Touch.

Read the rest of this post »

iPhone Security Apps and Configuration Tips

Wednesday, May 18th, 2011

There are several great iPhone Security Apps and a handful of good and simple configuration changes that you can make to your iPhone to greatly enhance you iPhone security and protect your sensitive information and identity.  We have seen security vulnerabilities in iPhone including flaws in pass code access (since fixed), so it makes sense to take proactive measures — especially as attacks on mobile devices are growing rapidly.

Easy Configuration Changes for Security and Privacy

There are several iPhone configuration settings that you should make to start protecting your iPhone.  The first thing to do is “Don’t Jailbreak Your iPhone“.  Jailbreaking removes much of the security inherent in the iPhone and makes it much easier for malicious software or users to gain access.  Furthermore, Apps that you can install on a Jailbroken phone may have not gone though any kind of screening process — you have to “trust” that they are OK.

Read the rest of this post »

Protect your mobile data from theft with “Remote Wipe”

Friday, January 14th, 2011

If your mobile device (e.g., iPad or Blackberry) is lost or stolen, then you have no control over who may gain access to:

  • Viewing existing and new email messages
  • All of your contacts
  • Your calendar appointments
  • Sending email as you
  • and more…

This is pretty serious, especially for folks who are subject to regulations and compliance laws.

For example, if a Nurse, using an iPad to manage patient appointments or to communicate via email with remote doctors, were to lose that iPad and it were to be accessed by someone else, then that may become a HIPAA “breach” (an unauthorized disclosure of protected health information) and the Nurse’s organization may be subject to stiff monetary fines and bad publicity.

Read the rest of this post »

LUXSCI