Categories: All

Mobile Security Action Plan


Use of personal devices at work have increased phenomenally with the onset of ‘Bring your own device’ common in many work environments. This approach enables enterprises to reduce IT capex spending for providing and maintaining technological resources. In contrast, this trend introduces new security risks to an organisation and requires a company to enact measures to prevent damage. Critically, third-party storage devices such as smartphones or USB’s are primary catalysts of valuable data leakage. Therefore, a simple click can create vulnerabilities that hackers could gain access to login credentials or even bank account credentials.

Here are few ways in which malware can potentially infect mobile devices:

  • Malicious apps – These involve using pirated tools to create malicious codes. Once downloaded, these compromised apps can steal sensitive data or damage the device.
  • Devices with vulnerable operating systems – Updating Mobile Devices regularly ensures present vulnerabilities are patched.
  • Opening spam emails, text messages, and voice mail– By opening unidentified links you will be creating a doorway for cyber-attacks like SMiShing attacks (through SMS). These attacks create backdoors to carryout phishing expeditions.
  • Connecting to unsecure Wi-Fi/ URL’s By accessing unprotected or fake internet connections, typically found in public places, or browsing insecure websites, you may expose your mobile device to man-in-the-middle attacks

An overview of Statistics :

Research studies on mobile vulnerabilities revealed that 38% of iOS mobile applications and 43% of Android applications contained high-risk vulnerabilities. Device security mechanism weakness catalyses vulnerabilities. Consequently, out of these discrepancies, 74% found in iOS and 57% in Android apps , which are statistically alarming.They should serve as a warning to administer policies and controls when utilising personal mobile devices for work. Therefore, It’s best to evaluate the following aspects that will help shape policy goals to implement regulations.

  • Employees execute tasks through personal devices.
  • Services that will give access to, and data exposure caps within those services.
  • Accessibility limits the employee may demand over their devices.
  • Ways to resolve issues on non compliant end users.
  • The correct combination of device ownership, management, and technical control can mitigate risk arising from vulnerabilities by taking these factors into account. Simultaneously, we will discuss the key technological approaches of mobile security management implementation .
  • Development of security management suites for device protection is known as Mobile Device and Application Management (MDM). This method does little to separate personal information and apps from company data. Even worse, it often leads to data loss. However, managing applications has overridden MDM shortcomings and has provided better solutions to curtail data loss. There are two main technical approaches that companies have adopted using this method

1. COPE method

COPE abbreviates to corporate-owned/managed, personally enabled. This method allows the company to have full management over the employees’ devices while allowing personal utility. Furthermore, this method is also feasible in situations where corporate-owned devices are at the disposal of employees. When a mobile device is managed (in iOS terms “supervised”) the organization that owns the device can install, update or restrict apps in the app store, filter web usage, configure WiFi settings, or block USB file transfers.

2. Personally owned, partially enterprise managed method

This method is a lighter device management approach. It enables some device-wide configuration policy enforcements and protects company data within apps or managed accounts. The benefit of this method is that it does not require data wipes. On the other hand, it doesn’t provide as much data security since it gives only partial control. For instance, in iOS’s, the company will restrict users from installing new configuration profiles that alter security settings.


Likewise, Companies opt Containerization method over app and data management since this method mainly avoids complete data wipes. Therefore, IT administrators can carry out a selective data wipe, and in turn, data loss issues can be curtailed. In this method, work-related tasks can be performed within an encrypted app facilitated by a Mobile Application Management service. Nevertheless, this method provides limited control over the device, it provides stronger control over the company’s apps and data. These contained applications prohibit copy and paste actions across applications and enable device monitoring.

Furthermore, our priority partners such as Microsoft and Google have published guidance for enterprises to configure accessibility to Office 365 and G Suite, from personal devices: Microsoft – Technical Guide: Office 365 UK Blueprint – BYOD Access Patterns Google – 6 ways that G Suite helps IT admins safely use BYOD

How Can We Help? At CSG Technologies, we can extend IT security and business continuity services tailored to fit your company’s needs. Our team of professionals is highly efficient and consists of a wide range of experience in curtailing cyber threats for various enterprises. Finally, we can help your company implement a viable mobile action plan while ensuring your network security from vulnerabilities associated with BYOD practices. Contact us today for more assistance.

Do you want to read more on this topic? Check out these articles:

suneth

Recent Posts

Embracing Emerging Technologies: From Risks to Rewards

Source: https://www.cio.com/article/3550265/from-risk-to-reward-mastering-the-art-of-adopting-emerging-technologies.html  Innovation in technology can feel like a double-edged sword. On one side, groundbreaking…

3 weeks ago

Staying Ahead in a Rapidly Disruptive World with Emerging Technologies

Source: https://aws.amazon.com/blogs/enterprise-strategy/how-executives-can-avoid-being-disrupted-by-emerging-technologies/  In a world of constant technological evolution, businesses face the challenge of navigating…

3 weeks ago

The Transformative Impact of Emerging Technologies on Our Lives

Source: https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2024/volume-17/emerging-technology-key-challenges-and-opportunities  Teens doing experiments in robotics in a laboratory. Boy in protective glasses using…

3 weeks ago

The New Essential Eight Technologies: What You Need to Know (Part 2)

n the first part of this series, we explored the transformative potential of Artificial Intelligence…

3 weeks ago

The New Essential Eight Technologies: What You Need to Know (Part 1)

Source: https://www.pwc.com/us/en/tech-effect/emerging-tech/essential-eight-technologies.html As businesses embrace digital transformation, emerging technologies play a pivotal role in shaping…

3 weeks ago

Emerging Technologies Shaping the Future of Business

Source: https://www.gartner.com/en/articles/30-emerging-technologies-that-will-guide-your-business-decisions  As businesses navigate an ever-evolving technological landscape, emerging technologies have the potential to…

3 weeks ago