Any data that can be accessed legitimately by mobile broadband technology, such as Sprint or AT&T, can be accessed by a hacker. I'm not sure if your client has a web site, or client data in a database, or even just a confidential list of contacts on a laptop, but it can all be subject to unauthorized access. The mobile broadband services do a pretty good job of restricting access control and authentication, but that's only a small part of a security solution that preserves the company's information assets.
Perhaps your client doesn't have any company data anywhere because it's only a loose confederation of folks who occasionally use the Internet to communicate. In that case, it's a pretty unique business. Still, data can hide in a lot of unexpected places. Any data that resides anywhere can be accessed, and if the company owns any data that resides in a DMZ or an internal server, it needs protection.
Dig Deeper on Cybersecurity risk assessment and management
Related Q&A from Russell Dean Vines
A smurf attack can slow down a network to the point of shutting it down completely. Learn how to understand a full-scale smurf attack and how to ... Continue Reading
Streaming video and audio sites are frequently visited on both home computers and work computers. Learn about streaming video security risks and what... Continue Reading
There are many resources available to help value-added resellers compile a threat matrix and perform risk analyses. Continue Reading