Smart phones demand smart privacy and security practices (part 1)


Share on LinkedIn

Smart phones demand smart privacy and security practices (part 1): Joe Campana, Madison WI

“Smart phones are pocket PCs. The conventional cell phone evolved into a powerful pocketsize personal computer with a wireless Internet connection over the last decade. Today’s smart phones run complete computer operating systems and thousands of applications programs from email and productivity to social networking and gaming. You and your cell phone are subject to greater privacy and security risks than with a home or office PC. Identity theft, viruses and other malware attacks are hazards of using smart phones.”

Wendy Note: Joe Campana is the National Examiner for for privacy and identity theft. And he is from Madison, WI. As a highly respected privacy and identity professional and book author, what he says makes an impact on me. He makes a extremely good case on how we use our wonderful “phones/computer/handbag/roledex/blogtool/social connector”, without much protection. I can’t wait for Part 2.

How do you use your smart phone? Have you even thought about the implications that Joe mentions?

Republished with author's permission from original post.

Wendy Soucie
Wendy Soucie provides clients a unique perspective on social business strategy across an organization. Wendy applies and follows specific social media strategy and methodologies for assessments, network growth, contribution, participation and execution. She is a certified social media strategist, Social Media Academy (Palo Alto, CA). She is an accomplished trainer and keynote personality speaker.


Please use comments to add value to the discussion. Maximum one link to an educational blog post or article. We will NOT PUBLISH brief comments like "good post," comments that mainly promote links, or comments with links to companies, products, or services.

Please enter your comment!
Please enter your name here