Vulnerable Mobile Apps - A Fuel for Mobile Security Threats
FREMONT, CA: The elevation in mobile access of corporate data has strategically arose mobile security threat for enterprises, on the other hand mobile communications and services became priority in business technology agenda which demands countermeasures against increasing breaches.
The mobile apps deployed and adopted by enterprises do not go through a security vetting process, acting as fuel for mobile security threats, reports Georege Leopold for ENTERPRISETECH. According to IDG Research, 74 percent enterprises have to face data breaches because of inadequate mobile security and 38 percent have experienced adversities due to software vulnerabilities. The survey suggests that organizations should consider establishing permanent connectivity on a network outside of enterprise control with mobile devices.
Though organizations are lighting the candle to meet the emerging need for better detection of malware and enhanced data protectors, in this emerging BYOD work environment mobile devices are the target of all cyber criminals. Phil Britt of eSecurity Planet reports that, most of the employees don’t carry responsibility of enterprise data security giving way for connection hijacking that exposes massive amounts of sensitive data. Firm security policies including rules for authentication, PII restrictions for email and restricted usage of passwords and PINs may prove advantageous to lower the level of risk.
"A mobile device policy should be part of the onboarding process; it should be read and signed off on before new employees receive their company device or access company resources with their personal device," says Jeffrey Smith, IT security officer at Wombat Security Technologies.
Gartner in its report recommends IT security professionals to leverage network access control methods, to follow enterprise mobility management baseline such as complex and strict retry standards for passcodes, specific minimum and maximum versions of platforms and operating systems and certified access to business email, virtual private networks, Wi-Fi and shielded apps.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....