• Latest

Mobile Device Security – Tackling the Risks

19 August, 2014
China Liberal Education Holdings Limited Starts Higher Volume Production and Expands Domestic Sales Channels of All-in-one Machine AI-Space

China Liberal Education Holdings Limited Starts Higher Volume Production and Expands Domestic Sales Channels of All-in-one Machine AI-Space

19 December, 2020
Bell connecting Canadians at home for the holidays with free TV programming and no extra usage fees on residential Internet

Bell connecting Canadians at home for the holidays with free TV programming and no extra usage fees on residential Internet

18 December, 2020
TEMSA: Bus exports to be delivered to the heart of the European Union

TEMSA: Bus exports to be delivered to the heart of the European Union

18 December, 2020
EU tries to reshape the rules of the Internet

EU tries to reshape the rules of the Internet

17 December, 2020
Matterport Brings 3D Capture to the iPhone

Matterport Brings 3D Capture to the iPhone

5 May, 2020
NASA Administrator Statement on Agency Coronavirus Status

NASA Administrator Statement on Agency Coronavirus Status

15 March, 2020
Technology Supports Social Distancing in age of Covid-19

Technology Supports Social Distancing in age of Covid-19

15 March, 2020
Second Staff Exchange Between EU CyberSecurity Organizations

Second Staff Exchange Between EU CyberSecurity Organizations

19 February, 2020
Iranian Professor on the Iran-US escalation: “Iranians expected to hear a clear and steadfast condemnation from Turkish authorities over Soleimani’s death”

Iranian Professor on the Iran-US escalation: “Iranians expected to hear a clear and steadfast condemnation from Turkish authorities over Soleimani’s death”

16 February, 2020
Badly Trained Spam – Only A Quarter of Brits Train their Spam Filter

Badly Trained Spam – Only A Quarter of Brits Train their Spam Filter

6 February, 2020
Year 2020: What is the Status of 5G Rollout Worldwide and Turkey

Year 2020: What is the Status of 5G Rollout Worldwide and Turkey

31 January, 2020
Turkish Competition Authority’s Android Decision

Turkish Competition Authority’s Android Decision

18 December, 2019
  • About Us
  • Contact Us
  • Homepage
  • Latest News
  • News Widget
  • Privacy Policy
Friday, September 29, 2023
Social icon element need JNews Essential plugin to be activated.
  • Login
  • Register
Globaltelconews
Advertisement
  • IT
  • Telecom
  • Mobile
  • e-Commerce
  • Fintech
  • Security
  • New Tech
  • About
    • About Us
    • Contact Us
    • Privacy Policy
No Result
View All Result
  • IT
  • Telecom
  • Mobile
  • e-Commerce
  • Fintech
  • Security
  • New Tech
  • About
    • About Us
    • Contact Us
    • Privacy Policy
No Result
View All Result
Globaltelconews
No Result
View All Result

Mobile Device Security – Tackling the Risks

globaltelconews-admin by globaltelconews-admin
19 August, 2014
in English
0

Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks at the risks involved with mobile devices and how to secure them.

Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications dream and a business risk nightmare. For those in the security industry, the focus is mainly on deploying solutions to provide protection. However, we are now at one of those key points of change which happen perhaps once in a generation, and that demand a new way of looking at things.

The convergence of communications, mobile devices and applications, high speed wireless, and cloud access at a personal level, are driving functionality demands on businesses at too fast a rate for many organisations.

While for some, lockdown is an appropriate solution to this burgeoning situation, for others, the legitimate business benefits mean they must learn to live with it and try their best to make it work securely.

These demands, coupled with user skills and experience of deploying mobile devices at home, mean that even organisations on lockdown can have challenging times dealing with staff guerrilla deployments.

Clearly, part of the solution is deploying the right tools to both minimise and report on the risks (e.g. mobile device management, tracking and RF management, authentication, encryption, and behaviour management – as well as basic security measures on mobile devices). Solutions are available from a variety of suppliers, including Kaspersky Lab, WatchGuard, Check Point, SafeNet, Becrypt, VASCO and Allot.

However, a much larger and more important component is actually changing the way that we interact with the problem.

Currently, many organisations see dealing with these unprecedented risks as a challenge for the IT security team, whose role is to protect the organisation.

Traditionally, that was a good working model. However, in the new environment, with immense pressure for fast change and fast deployment of new applications, it is not possible for most IT security teams to carry the responsibility of securing the whole business and every user singlehandedly.

Security needs to be the responsibility of every individual user, every manager and every member of the Board. However, this is more typically honoured in the breach than in the observance, as evidenced by the fact that only a small number of staff are actually formally sanctioned or sacked for failure to comply.

Mobile security strategy

  • Risk analysis and risk acceptance
    Before any mobile device, access, application or service is added, it should be signed off as accepted by the Board

  • Planning
    Planning for deployment should include security implementation or overt acceptance of the risk

  • Embedding security
    Security needs to be deployed with the solution, not post event.

  • Policies
    Policies need to be clearly enunciated, not just contained in a policy document

  • Processes
    Processes need to be clear, as do consequences

  • Education and staff involvement
    Staff education is essential and should be education, not just a list of things staff cant do. If employees dont understand why they need to secure their own mobile devices or wireless connections, they certainly arent going to be overly concerned about yours.

  • Deployment
    Deployment of mobile devices, including security elements, needs to be sold to staff i.e. get buy-in from staff that security is a key element of deployment, rather than presenting it as security needs to be there, so live with it. Mobile device security and monitoring need to be introduced at the point of deployment. If this is a sign off/buy-in situation, it gets management commitment and cuts negative activities around mobile device usage

  • Monitoring and feedback loop.
    It is crucial to not only monitor, but also to be seen to be monitoring mobile security measures. High visibility and regular feedback to all staff, on both success and failure, are very important.

  • Analysis
    The Board needs to have regular reporting of the security landscape, so they are aware of the level of threat, and the levels of risk that they have accepted.

  • Forensics
    After a breach, particularly for mobile devices, organisations want to understand what has happened, what the failure was and what action they can take.

Implementing the strategy obviously then involves the deployment of the correct tools and reporting. Clearly this also raises issue of the integration (or replacement) of existing tools with broader management and reporting solutions – but that is a topic for another day!

Previous Post

3 in 4 UK Adults Shop Online and 54% Bank Online

Next Post

Airbus Defence And Space Introduces Expanded Terralink, The Next Generation Of Satellite Broadband Connection

Next Post

Airbus Defence And Space Introduces Expanded Terralink, The Next Generation Of Satellite Broadband Connection

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Navigation

  • Authors
  • Author Login
  • Author Application
  • Advertisement
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Use
  • Sitemap
Social icon element need JNews Essential plugin to be activated.

© 2018 Globaltelconews.com

No Result
View All Result
  • IT
  • Telecom
  • Mobile
  • e-Commerce
  • Fintech
  • Security
  • New Tech
  • About
    • About Us
    • Contact Us
    • Privacy Policy

© 2018 Globaltelconews.com

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In