Managing Electronic Transactions Through Mobile Devices

1770 Words8 Pages
Managing Electronic Transactions Through Mobile Devices Each year more and more people use mobile devices to access information over the Internet than through a wired Ethernet connection. Most businesses have come to the realization that the use of mobile devices are vital to them and will aide in the success of their company. Mobile devices are being deployed as an avenue to help an organization gain a competitive advantage in this technological era. The drive for mobility is a component of the business technology program for most companies today. The integration of these devices make it easier than ever for employees to communicate and collaborate with other employees, customers, vendors, and others that are outside the brick and mortar…show more content…
It also helps to improve resources offered to customers and ultimately lead to great flexibility in workers. Mobile devices have also allowed advancement in more working practices by providing service over the internet. So much can be done over the internet; mobile technology has provided and allowed organizations with the opportunity for greater productivity, availability and convenience. Accessing company information through the use of mobile devices has some great advantages. But even with all the advantages, there are still risks associated with using mobile devices. As businesses uses these devices to gain entry to sensitive corporate information, the number and types of devices are increasing and are becoming more known, which opens the door for security risks and vulnerabilities, which make security is an important concern. Since mobile devices can contain vast amounts of sensitive and personal information, they are attractive targets that provide unique opportunities for criminal’s intent on exploiting them. Mobile security threats come in many forms, and they are continuing to advance. There are several threats that employee’s mobile device may be subject to, such as eavesdropping, denial of services, unauthorized access, theft and loss, and mobile malware and phishing. Eavesdropping can happen because most information sent to the company’s server from the employee is usually unencrypted, which allows hackers to eavesdrop on the
Open Document