Trusting a personal mobile device in your business environment
Through 2015, more than 75 percent of mobile applications will fail basic security tests, according to Gartner, Inc. Enterprise employees tend to download from app stores and use mobile applications that can access enterprise assets or perform business functions. These applications have little or no security assurances. Consequently, these applications can be exposed to attacks and violations of enterprise security policies.
For IT administrators, it is paramount to ensure that employees fully understand the imminent need to secure their personal device when used for work. This is especially important as cyber-attacks on mobile devices are increasing, resulting in data loss, security breaches and compliance/regulatory violations. Yet most users often have a 'false sense of security' that their devices are secure and cannot be compromised.
To mitigate these risks, it is essential for IT administrators to incorporate mobile security as part of their overall network, rather than implemented as an afterthought. If an organisation decides to allow their employees to bring their own devices, it needs to build in solutions that will better protect the wider network. Possible solutions include ensuring corporate network policies extend to employee-owned devices and implementing mechanisms to secure, regulate and monitor access to corporate resources and data from these devices.
Organisations can do more to secure their own infrastructures from hackers by installing the NG Firewall where it helps to safeguard network traffic against line outages and link quality degradation. Hence, distributed networks are secured safely where the NG Firewall can transparently move traffic to alternative lines and keep traffic flowing in case of line failure.
As much as this presents a newer form of security challenge to IT administrators and managers, there are always ways to manage the issue of data security. What is important is to work towards creating a more secure firewall that would protect against different threat vectors from varied sources, with increased privacy controls and data protection.
Going forward there is much responsibility on the shoulders of the technology providers to fight the latest vulnerabilities. As mobile technologies become more commonplace, security technologies will take the front seat in the IT strategies for businesses. The task at hand will be to envision the security needs of the next generation mobile initiatives and gear up to deliver the ammunition for the same.
Sign up for Computerworld eNewsletters.