Vulnerable Mobile Apps - A Fuel for Mobile Security Threats
FREMONT, CA: The elevation in mobile access of corporate data has strategically arose mobile security threat for enterprises, on the other hand mobile communications and services became priority in business technology agenda which demands countermeasures against increasing breaches.
The mobile apps deployed and adopted by enterprises do not go through a security vetting process, acting as fuel for mobile security threats, reports Georege Leopold for ENTERPRISETECH. According to IDG Research, 74 percent enterprises have to face data breaches because of inadequate mobile security and 38 percent have experienced adversities due to software vulnerabilities. The survey suggests that organizations should consider establishing permanent connectivity on a network outside of enterprise control with mobile devices.
Though organizations are lighting the candle to meet the emerging need for better detection of malware and enhanced data protectors, in this emerging BYOD work environment mobile devices are the target of all cyber criminals. Phil Britt of eSecurity Planet reports that, most of the employees don’t carry responsibility of enterprise data security giving way for connection hijacking that exposes massive amounts of sensitive data. Firm security policies including rules for authentication, PII restrictions for email and restricted usage of passwords and PINs may prove advantageous to lower the level of risk.
"A mobile device policy should be part of the onboarding process; it should be read and signed off on before new employees receive their company device or access company resources with their personal device," says Jeffrey Smith, IT security officer at Wombat Security Technologies.
Gartner in its report recommends IT security professionals to leverage network access control methods, to follow enterprise mobility management baseline such as complex and strict retry standards for passcodes, specific minimum and maximum versions of platforms and operating systems and certified access to business email, virtual private networks, Wi-Fi and shielded apps.
By Dr. John Bates, CTO, Intelligent Business Operations &...
By Denise Zabawski, CIO, Nationwide Childrens Hospital
By Cynthia Weaver, A.V.P of IT, Walbridge
By Kris Lappala, CIO, Kiewit
By Sherry Aaholm, VP & CIO, Cummins [NYSE:CMI]
By Leo Casusol, CIO, Liquidity Services
By Joe Fuller, VP/CIO, Dominion Enterprises
By Dennis Fiszer, CCO, HUB International
By David Butler, Sr. Director, Digital Customer Experience,...
By Mark Jacobsohn, SVP, Booz Allen Hamilton
By Miguel Gamino, CIO & Executive Director-Department of...
By Jonathan Reichental, CIO, City of Palo Alto
By Pam Puetz, VP & HR Services, First American Financial...
By Aref Matin, CTO, Ascend Learning
By Jim Sills, CIO/Cabinet Secretary, State of Delaware
By Jesse Laver, Vice President Global Sector Development,...
By Andy Newsom, CIO, CSL Behring
By Jason Cook, CISO, BT Americas [NYSE:BT]
By Jim Grubb, VP Marketing & Chief Demonstration Officer, Cisco
By Don Lindsey, VP and CIO, Tallahassee Memorial HealthCare