01.03.2019 Views

CDM-CYBER-DEFENSE-eMAGAZINE-March-2019

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

illion risks and threats among its customers, or about 50 per device. The sophisticated tactics<br />

that hackers use to conduct cyberattacks are bypassing office walls to where employees – and<br />

thus, their employers – are most vulnerable: mobile. Take phishing, for example. According to<br />

Verizon, over 90 percent of breaches started with a phishing attack and Adestra notes that over<br />

60 percent of emails were opened on mobile devices.<br />

The problem is that mobile devices such as smartphones are fundamentally different from other<br />

enterprise devices such as desktops and laptops in this vital respect: IT does not administer the<br />

advice – the user does. Although modern collaboration techniques often require employees to<br />

create and share unstructured company data from their mobile devices, IT does not have the<br />

proper amount of visibility into these devices to know what threats the company data may be<br />

facing. This explains why, in a recent survey, Zimperium found that 42 percent of organizations<br />

were unsure if mobile devices had been involved in past security breaches involving their<br />

organization.<br />

Best Practices in BYOD and Mobile Security<br />

There’s no denying that personal devices in the workplace aren’t going anywhere, given the<br />

unparalleled value that they bring to organizations. In fact, Forbes recently reported that enabling<br />

the mobile workforce drives 30 percent better processes and 23 percent higher productivity.<br />

However, balancing the use of mobile with recognition of and preparation for the growing number<br />

of cyber-risks these devices face needs to become a top priority for IT teams in <strong>2019</strong>. Data<br />

mandates such as Europe’s General Data Protection Regulation (GDPR) have shown that<br />

governments and consumers are getting serious about the security of their information. It’s<br />

essential to keep sensitive company information secured on mobile devices in order to maintain<br />

trust from customers and, in turn, maintain a competitive edge.<br />

The bottom line is that organizations need to embrace a healthy mobile security policy that<br />

protects the organization and its sensitive IP while promoting productivity on mobile devices both<br />

inside and outside of the corporate network. For enterprises who are struggling to adopt mobile<br />

security best practices, here are a few key things to consider when balancing BYOD and security:<br />

• If mobile devices are being used to access corporate data, including from sources<br />

such as email and mobile applications, the company has a responsibility to ensure<br />

the data is protected. This applies to corporate devices as well as BYOD<br />

devices. Perhaps the most basic and all-encompassing reason for this is that without<br />

ensuring data is protected, companies will be out of compliance with one – or multiple –<br />

regulations. The modern-day business environment means that every company is now a<br />

technology company. The average company in operation today typically processes and<br />

stores a large volume of highly sensitive employee, customer and client data that they<br />

have an obligation to protect. Regulations such as Europe’s General Data Protection<br />

Regulation (GDPR) show us that today’s consumers and employees are taking the<br />

mismanagement of their data more seriously than ever before – and so are their<br />

governments. In addition to avoiding millions of dollars in potential fraud and fines, the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!