Rarely has a single smartphone generated so much excitement as the one used by President Trump.
Earlier this month it was reported that the President had swapped his Android phone for a more secure encrypted device approved by the Secret Service. President Obama was given a similar device, which could not take photos, play music, or even send text messages, because of security concerns. But it looks like President Trump's old phone has made at least one re-appearance.
According to the New York Times, President Trump has been using his old Android device to tweet while watching TV:
Mr. Trump's wife, Melania, went back to New York on Sunday night with their 10-year-old son, Barron, and so Mr. Trump has the television -- and his old, unsecured Android phone, to the protests of some of his aides -- to keep him company. That was the case after 9 p.m. on Tuesday, when Mr. Trump appeared to be reacting to Bill O'Reilly's show on Fox News, which was airing a feature on crime in Chicago.
It's perhaps no surprise, as President Trump generated so much momentum during his campaign with his tweets. However, the news has raised concerns: smartphone security is still a work in progress, even for state-of-the-art devices, which is exactly why government agencies spend so much on security-hardened phones that can be carried safely in secure environments like the White House.
Even if this outing for the old Android was a one-off, it's also a reminder to all that security policies might be easy to write, but they're hard to get right, and even harder to enforce.
Firstly, if a company's security policy is so strict that it stops people from doing their jobs (or from tweeting while watching TV), then chances are they will either try to get around it, or simply ignore it.
Policies need to understand the reality of life day-to-day, as well as the security risks your organization faces. That means they need to be developed with the users, not in spite of them.
Banning certain actions (like using cloud services or personal devices) may well be appropriate from a security point of view but may be a disaster for productivity or morale. So the security policy (and infrastructure) may have to change or be updated on a regular basis, otherwise they risk encouraging bad behaviours, not stopping them.
And even if an organisation has a security policy that makes sense for most staff, there will be those who will consider themselves to be the exception, either because they think they are too smart or because they are too senior. It's tough for junior staff tasked with security to criticize the chief executive -- or the President -- for using the wrong device.
This is why it's important for everyone to understand the security threat level for each organization: a small business will face different threats to a school, or a big business, or a government agency. Understanding the consequences of a security leak will help concentrate the mind of everyone from top to bottom.
Education is the key, both helping staff to understand what risky behaviours are, and what the consequences might be. Technology, while important, is only part of the problem.
Read more on smartphone security
- Apple iPhone 7 is being hardened to handle military-grade secret (TechRepublic)
- The world's most secure smartphones - and why they're all Androids
- Cybersecurity Research 2016: Weak Links, Digital Forensics, and International Concerns (TechPro Research)
- Securing the human operating system: How to stop people being the weakest link in enterprise security
- Trump using unsecured Android phone, report says (CNET)