How a security-focused mobile strategy can help organizations stay safe in their digital transformation efforts and beyond

The focus of many organizations’ digital transformation has been on mobile devices. Employees depend on their smartphones and tablets (and a multitude of apps) to conduct everyday business, from anywhere at any time.

However, even though mobile is now the heart of so many organizational digital transformations, too many businesses are actually failing with their mobile strategy, and that could be setting them up for security and privacy breakdowns, according to a new study from SOTI.

Ill-Equipped to Handle Data Leaks and Breaches

Respondents to the survey, “Racing Toward the Future of Enterprise Mobility,” said the biggest mobile threats they face today are data leakages (70% of those surveyed), data breaches (61%), phishing attacks (55%), mobile malware (54%) and malicious apps (47%). The study also revealed that 33% of enterprises arm their workers with mobile devices that are ill-equipped to handle these threats. The fact that 31% of survey respondents said they had experienced a data breach within the past two years is a proof point around their biggest security fears becoming a reality.

“One of the biggest mistakes organizations make is not doing a complete audit of all of their digital touchpoints to evaluate risks of data leaks and potential breaches,” said Shash Anand, vice president of Product Strategy at SOTI. “For example, content delivery to mobile devices should only be performed by trusted sources and that trust must be established ahead of time and validated regularly.”

Another mistake, he said, is that end users too often are free to visit any website, which creates opportunities for accidental downloading of malicious apps or code that can run on the device and share data with other systems. “Even email access on mobile devices requires trust, which is typically performed via security certificates that also need to be set up properly,” Anand noted. “Otherwise, you could run the risk of downloading attachments from hackers looking to penetrate the system.”

Digital Tartar

Anand said one of the more unique answers to the survey question on concerns around enterprise mobility cites “digital tartar.”

“This striking term effectively focuses on the ‘buildup of sensitive data in the nooks and crannies of file shares’ and ‘cloud storage that never gets deleted after it is no longer used,’” he said. “It is a concern that will no doubt continue to grow in line with the expanding mass of data being collected by all enterprises with a mobile and digital footprint.”

Another layer of digital tartar that is often forgotten in the mobile strategy is old devices. Older devices become the source of potential data breaches and leakages because they often don’t fill the gaps that newer devices do, Anand explained. Outdated equipment generally refers to outdated software and the capability to handle new updates.

“You also run the risk of integration with other systems. Fixing this problem is generally around awareness and education of the total cost of ownership of an organization’s devices’ life cycle and outlining risk mitigation strategies,” he said. “There is a false perception that updating devices and keeping them up to date is challenging for an organization, but with the right enterprise mobility and IoT management solution in place, organizations can address many of their concerns and keep both their data and devices secure.”

What Companies Need to Address in 2020

The reliance on mobile devices only going to increase as more employees prefer to use a smartphone or tablet to connect to the corporate network. That means the data on these devices must be secured as well as the communication to and from these devices. Otherwise, organizations run the risk of millions of security holes.

“Most organizations purchase technology that is a one-size-fits-all approach, without actually addressing their specific needs and plans to update devices accordingly,” Anand said. “Failure to tune in to updates can lead to issues down the line that go far beyond attempts to stay relevant and ahead of the competition.”

To address their mobile strategy in 2020, companies should create a comprehensive plan that prioritizes and mitigates these risks, and then align the process across all major stakeholders, including operational technology, IT and cybersecurity. This, Anand said, will harden mobile (and IoT) security and minimize the risk of data breaches.

Featured eBook

SANS 2019 Threat Hunting Survey: The Differing Needs of New and Experienced Hunters

SANS threat hunting experts Mathias Fuchs and Joshua Lemon capture the different needs within organizations that are just starting their threat hunting journey, versus those who are honing their skills and programs. Read the report to help grow your program and improve threat hunting with: Definitions of threat hunting Methodologies of performing threat hunting Spending … Read More margin: 0; border-top-style: solid; border-left-style: solid .pt-cv-content-item border-right-style: solid; border-bottom-style: solid;
#pt-cv-view-e05fc868f1 .pt-cv-title a, #pt-cv-view-e05fc868f1 .panel-title font-size: 20px !important; line-height: 1.3 !important; font-weight: 600 !important;
#pt-cv-view-e05fc868f1 .pt-cv-hover-wrapper::before background-color: rgba(0,0,0,.3) !important;
#pt-cv-view-e05fc868f1 .pt-cv-content-item:hover .pt-cv-hover-wrapper::before background-color: rgba(51,51,51,.6) !important;
#pt-cv-view-e05fc868f1:not(.pt-cv-nohover) .pt-cv-mask * color: #fff;
#pt-cv-view-e05fc868f1 .pt-cv-carousel-caption background-color: rgba(51,51,51,.6) !important;
#pt-cv-view-e05fc868f1 .pt-cv-specialp background-color: #CC3333 !important
#pt-cv-view-e05fc868f1 .pt-cv-specialp * color: #fff !important;
#pt-cv-view-e05fc868f1 .pt-cv-pficon color: #bbb !important;
#pt-cv-view-e05fc868f1 .pt-cv-custom-fields * font-weight: 600 !important;
#pt-cv-view-e05fc868f1 .add_to_cart_button, #pt-cv-view-e05fc868f1 .add_to_cart_button * color: #ffffff !important; background-color: #00aeef !important;
#pt-cv-view-e05fc868f1 .woocommerce-onsale color: #ffffff !important; background-color: #ff5a5f !important;
#pt-cv-view-e05fc868f1 .pt-cv-readmore:hover color: #ffffff !important; background-color: #6190bb !important;
#pt-cv-view-e05fc868f1 + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-e05fc868f1 + .pt-cv-pagination-wrapper .pagination .active a color: #ffffff !important; background-color: #00aeef !important;
[id^=’pt-cv-filter-bar-e05fc868f1′], [id^=’pt-cv-filter-bar-e05fc868f1′] .active .pt-cv-filter-option, [id^=’pt-cv-filter-bar-e05fc868f1′], [id^=’pt-cv-filter-bar-e05fc868f1′] .dropdown-toggle color: #fff !important; background-color: #00aeef !important;
[id^=’pt-cv-filter-bar-e05fc868f1′] .pt-cv-filter-title color: #fff !important; background-color: #00aeef !important;
#pt-cv-gls-e05fc868f1 li color: #fff !important; background-color: #ff5a5f !important;
#pt-cv-view-e05fc868f1 .pt-cv-gls-header color: #fff !important; background-color: #00aeef !important;

Let’s block ads! (Why?)

Source link

Load More By admin
Load More In Mobile

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also

SpaceX’s first ever Block 5 booster gives one last hurrah, in photos – Teslarati

By Eric Ralph Posted on January 21, 2020 After helping SpaceX enter a new era of routine r…