CDM-CYBER-DEFENSE-eMAGAZINE-March-2019
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
illion risks and threats among its customers, or about 50 per device. The sophisticated tactics<br />
that hackers use to conduct cyberattacks are bypassing office walls to where employees – and<br />
thus, their employers – are most vulnerable: mobile. Take phishing, for example. According to<br />
Verizon, over 90 percent of breaches started with a phishing attack and Adestra notes that over<br />
60 percent of emails were opened on mobile devices.<br />
The problem is that mobile devices such as smartphones are fundamentally different from other<br />
enterprise devices such as desktops and laptops in this vital respect: IT does not administer the<br />
advice – the user does. Although modern collaboration techniques often require employees to<br />
create and share unstructured company data from their mobile devices, IT does not have the<br />
proper amount of visibility into these devices to know what threats the company data may be<br />
facing. This explains why, in a recent survey, Zimperium found that 42 percent of organizations<br />
were unsure if mobile devices had been involved in past security breaches involving their<br />
organization.<br />
Best Practices in BYOD and Mobile Security<br />
There’s no denying that personal devices in the workplace aren’t going anywhere, given the<br />
unparalleled value that they bring to organizations. In fact, Forbes recently reported that enabling<br />
the mobile workforce drives 30 percent better processes and 23 percent higher productivity.<br />
However, balancing the use of mobile with recognition of and preparation for the growing number<br />
of cyber-risks these devices face needs to become a top priority for IT teams in <strong>2019</strong>. Data<br />
mandates such as Europe’s General Data Protection Regulation (GDPR) have shown that<br />
governments and consumers are getting serious about the security of their information. It’s<br />
essential to keep sensitive company information secured on mobile devices in order to maintain<br />
trust from customers and, in turn, maintain a competitive edge.<br />
The bottom line is that organizations need to embrace a healthy mobile security policy that<br />
protects the organization and its sensitive IP while promoting productivity on mobile devices both<br />
inside and outside of the corporate network. For enterprises who are struggling to adopt mobile<br />
security best practices, here are a few key things to consider when balancing BYOD and security:<br />
• If mobile devices are being used to access corporate data, including from sources<br />
such as email and mobile applications, the company has a responsibility to ensure<br />
the data is protected. This applies to corporate devices as well as BYOD<br />
devices. Perhaps the most basic and all-encompassing reason for this is that without<br />
ensuring data is protected, companies will be out of compliance with one – or multiple –<br />
regulations. The modern-day business environment means that every company is now a<br />
technology company. The average company in operation today typically processes and<br />
stores a large volume of highly sensitive employee, customer and client data that they<br />
have an obligation to protect. Regulations such as Europe’s General Data Protection<br />
Regulation (GDPR) show us that today’s consumers and employees are taking the<br />
mismanagement of their data more seriously than ever before – and so are their<br />
governments. In addition to avoiding millions of dollars in potential fraud and fines, the