Over the past two decades, we have witnessed significant technology advances in mobile devices, from the personal data assistants (PDAs) of early 2000 to the omnipresent Smartphone of today. These advances have both intertwined and blurred the boundaries of personal and corporate life of today corporate users. Technologies have enabled the unending access to emails, mobile business applications as well as sensitive company data anytime, anywhere.
While this demonstrates the practicality, flexibility of using mobile devices to conduct business, some may even stood on high ground, raving about the virtues of increased productivity. But undeniably, it has also created a herculean task for organization to ensure that they have an adequate framework to ensure new security threats are contained and nullified as they transient heinously across various platforms. Security consultants have been increasingly been bombarded with queries about how to secure companies intellectual property from malicious hackers as well as internal users.
Not surprising, only a few organizations have a mobile security agenda in place, and many organizations are still unaware of the security threat posed by unrestricted Smartphone. The poll, gathered at a mobility webinar by Software AG, found that 60 percent of companies had no mobility strategy and 38 percent of those surveyed are yet to consider their strategy, while 22 percent have only just begun “initial research”.
Challenges faced by organizations
The proliferation of mobile devices and mobile applications, combined with the demands from executives and employees for support of their personal devices to access business applications and data, force IT organizations to take a hard look at their current mobile infrastructure. Unfortunately, much of this infrastructure is inadequate to deal with today’s challenges, including:
- The growing diversity of mobile platforms and applications being introduced resulting it an uphill tasks for the IT department to play keep up.
- Addressing mobile security concerns and protecting data as it moves further outside the network perimeter
- Many organizations also do not have authentication policies(mobility security policies for the matter) on their employees’ mobile devices allowing unauthorized access
- Unable to react to a security compromise or suspicious user behavior by locking down a mobile device and wiping the contents if required.
Recommendations
Correctly implementing a mobile device strategy across the corporate environment and mapping that strategy to local device settings can help address concerns surrounding data loss prevention, stolen devices, password policies, VPN access to intranet resources and other security issues. A mobile strategy framework review can identify risks in mobile device settings and vulnerabilities in the current implementation.
Based on experience and best practices, below are the recommended approach to evaluate and plan out your BYOD strategy.
- Conduct a comprehensive evaluation of your use case
- Identify the risks you may encounter and the controls you need.
- Develop a proof of concept/pilot
- Selection of the right Mobile Device Management (MDM) solution
As mobile technologies continue to innovate over the coming years, organizations using these technologies will need to continuously assess the security implications of adopting these advancements. Only a evolving and agile mobile security risk approach will enable a holistic evaluation of the risk exposure that comes with these new innovations. Have you given enough thought about your business mobility strategy and how it will fits into your overall enterprsie risk framework?
Thanks to share your comments or opinion. Cheers
These are really enormous ideas in concerning blogging.
You have touched some pleasant points here. Any way keep up wrinting.
Thanks Laurie for the endorsement!
Excellent way of explaining, and good post to take information about my presentation focus, which i am
going to present in school.
Thanks Ronny!
These are actually wonderful ideas in on the topic of blogging.
You have touched some nice things here. Any way keep up
wrinting.
A fascinating discussion is worth comment. I do believe
that you need to publish more on this subject matter, it might not be a taboo subject but generally folks
don’t discuss such subjects. To the next! Cheers!!
Wonderful work! This is the kind of information that are supposed to be shared around the web.
Shame on Google for now not positioning this submit higher!
Come on over and seek advice from my website .
Thank you =)
I simply want to mention I am just all new to blogging and site-building and really savored this web page. More than likely I’m likely to bookmark your site . You certainly have great writings. Appreciate it for sharing with us your web-site.