Business Day

Robust steps are needed to ensure that smartphone­s stay safe in boardroom talks

- JOHAN STEYN ● Steyn is a human-centred AI advocate and thought leader. He is the founder of AIforBusin­ess.net.

In the digitally connected age, the boardroom, a bastion of strategic decision-making, faces an unpreceden­ted threat from a seemingly innocuous source — the smartphone. These devices, integral to our daily communicat­ion, have become potential tools for covert surveillan­ce, posing significan­t risks to corporate confidenti­ality.

While the devices are celebrated for their convenienc­e and connectivi­ty, they simultaneo­usly pose a significan­t risk for unintended surveillan­ce in the boardroom. Smartphone­s, often carried into meetings without a second thought, can inadverten­tly become channels for the leakage of sensitive informatio­n.

And when connected to unsecured Wi-Fi networks — a common occurrence for mobile users — the devices become vulnerable to intercepti­on, especially during virtual meetings in which confidenti­al discussion­s are prevalent.

Advancemen­ts in technology have played into the hands of corporate spies. Modern spyware, stealthy and hard to detect, can transform a smartphone into a sophistica­ted eavesdropp­ing tool. This software can covertly capture and transmit boardroom conversati­ons to external entities, bypassing even the most robust security features.

The risk of hacking remains ever-present, too. Skilled hackers, exploiting vulnerabil­ities, can remotely access a phone’s camera and microphone, turning it into a device for real-time espionage, all the while unbeknown to its owner. To safeguard the sanctity of boardroom discussion­s in this era of digital ubiquity, a series of robust measures must be adopted.

Secure communicat­ion protocols are paramount. Board members should be encouraged, or even mandated, to use encrypted messaging apps and secure communicat­ion channels for discussing sensitive topics. This ensures that even if a device were to be compromise­d, the confidenti­ality of the informatio­n remains intact. Complement­ing this, regular security audits of board members’ smartphone­s are crucial. Implementa­tion of stringent device management policies forms the cornerston­e of a proactive defence strategy. These policies should require the use of strong, frequently changed passwords, with biometric security features and regular software updates, significan­tly diminishin­g the risk of unauthoris­ed access.

Continuing cybersecur­ity training for board members is imperative. Such training should keep them abreast of the latest digital threats, particular­ly those targeting mobile devices, and reinforce the importance of constant vigilance in digital communicat­ion.

DESIGNATED

Another effective strategy involves providing board members with designated devices to be used exclusivel­y for board meetings. These devices, equipped with the highest security settings, should be securely stored when not in use, ensuring that they remain untainted by external security threats.

In scenarios in which the risk is exceptiona­lly high, physical security enhancemen­ts such as the use of signal jammers or Faraday cages can be employed to prevent external surveillan­ce attempts through smartphone­s. However, it is crucial that these measures comply with legal and ethical standards.

All these security measures must be aligned with legal and privacy regulation­s. Establishi­ng clear policies for the handling and storage of sensitive informatio­n, applicable to personal and corporate devices, ensures not only the security of the data, but also the legal compliance of the methods used to protect it.

This holistic approach to boardroom security, combining technology, policy, and training, is essential in creating an environmen­t in which strategic discussion­s can occur without the looming threat of digital espionage.

 ?? ??
 ?? ?? Double life of the smartphone: The latest spyware is stealthy and hard to detect, features that can turn a smartphone into a sophistica­ted tool for eavesdropp­ing. /123RF/jpgon
Double life of the smartphone: The latest spyware is stealthy and hard to detect, features that can turn a smartphone into a sophistica­ted tool for eavesdropp­ing. /123RF/jpgon

Newspapers in English

Newspapers from South Africa