Because Risks are Greater: Mobility and BYOD Solutions

  • calender Image August 21, 2014
  • Posted By Eric Schlissel
Blog Image

By 2018, there could be more than a billion employee-owned smartphones and tablets being used in the workplace, according to a recent article from Information Age. Unfortunately, while office-use of personal mobile devices is up, so are the creation of mobile malware and vulnerabilities.

An annual security report from Cisco reports that security gaps are increasing and widening as traditional solutions are applied to new ways of doing business. The higher the “street value” of a company’s data — including corporate intellectual property and individual health care data — the greater the risk of that data becoming a target, the report stated.

The problem increases with BYOD, as many employees download apps onto their mobile devices without thought of security.
The issue leaves security teams attempting to provide solutions that are “any-to-any” the report noted: To protect any user, on any device, anywhere, accessing any application or resource.

Though just 1.2 percent of all web malware encounters involved mobile malware that targets specific devices, the report stated, the trend is evolving. 99 percent of all mobile malware intended to compromise a device targeted Android devices.

However, phishing, like jacking, social engineering ruses and redirects to different websites than the user intended are common among mobile malware not targeting a specific device. Of those instances, Android users had the highest number of encounters — 71 percent — while Apple iPhone users had 14 percent of those types of web malware encounters.

Information Age states that, while it’s difficult to prevent mobile users from downloading apps, ensuring that they avoid unofficial app stores is critical to data security. It is also crucial for security professionals to be able to identify compromised devices and monitor their activity across the extended network.

XOverture IT Services has ample experience with mobility and BYOD solutions to help businesses mitigate the risks involved with employees using their personal devices for work. We can help you create a BYOD policy, secure, manage, monitor, and support mobile devices in your workplace and much more. For more information, Contact us.

Also Read:
Meeting The Challenge Of BYOD-Minimizing Risks With Managed IT Services
Mobility and BYOD Solutions: FiveThings to Consider
Mobility and BYOD Solutions: How Resisting Mobility Can Cost Your Company

Mobility & BYOD

Because Risks are Greater: Mobility and BYOD Solutions

By 2018, there could be more than a billion employee-owned smartphones and tablets being used in the workplace, according to a recent article from Information Age. Unfortunately, while office-use of personal mobile devices is up, so are the creation of mobile malware and vulnerabilities.

An annual security report from Cisco reports that security gaps are increasing and widening as traditional solutions are applied to new ways of doing business. The higher the “street value” of a company’s data — including corporate intellectual property and individual health care data — the greater the risk of that data becoming a target, the report stated.

The problem increases with BYOD, as many employees download apps onto their mobile devices without thought of security.
The issue leaves security teams attempting to provide solutions that are “any-to-any” the report noted: To protect any user, on any device, anywhere, accessing any application or resource.

Though just 1.2 percent of all web malware encounters involved mobile malware that targets specific devices, the report stated, the trend is evolving. 99 percent of all mobile malware intended to compromise a device targeted Android devices.

However, phishing, like jacking, social engineering ruses and redirects to different websites than the user intended are common among mobile malware not targeting a specific device. Of those instances, Android users had the highest number of encounters — 71 percent — while Apple iPhone users had 14 percent of those types of web malware encounters.

Information Age states that, while it’s difficult to prevent mobile users from downloading apps, ensuring that they avoid unofficial app stores is critical to data security. It is also crucial for security professionals to be able to identify compromised devices and monitor their activity across the extended network.

XOverture IT Services has ample experience with mobility and BYOD solutions to help businesses mitigate the risks involved with employees using their personal devices for work. We can help you create a BYOD policy, secure, manage, monitor, and support mobile devices in your workplace and much more. For more information, Contact us.

Also Read:
Meeting The Challenge Of BYOD-Minimizing Risks With Managed IT Services
Mobility and BYOD Solutions: FiveThings to Consider
Mobility and BYOD Solutions: How Resisting Mobility Can Cost Your Company

You also might be interested in

Related Image

The Top 5 Costly Data Integration Project Mistakes And How to Avoid Them 

calender ImageJune 30, 2022 You have probably been through at least one data integration project. And if you are like most businesses, that project probably was not as smooth as you would have liked. In fact, it is likely […] Read full post
Related Image

How Long Does Server Migrations Take?

calender ImageApril 04, 2022 Server migration is a highly strategic undertaking that must be completed without disrupting corporate operations, SLAs, data performance, or availability. There can be several reasons for it, such as cost-cutting initiatives, regulatory requirements, service risk […] Read full post
Related Image

FAQ: GeekTek Rebranding as XOverture

calender ImageJuly 28, 2021 We’re excited to announce that as of 7/29/2021 the IT services company formerly known as GeekTek will be changing our name and branding to XOverture! Why the Name Change? Our CEO Eric Schlissel started GeekTek […] Read full post