APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • CXO Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Forget the Data Center, Endpoint Security is the New Security Hotspot

    Mitch Coopet, Co-Founder & Chief Technology Officer

    IT is Indispensable for Business Optimization

    Dhiren Savla, Chief Information Officer, VFS Global

    Plastics - A Green & Smart Future

    Arturo Valencia, Director of Research & Development, Dura-Line Corporation

    Disruption looms: The rise of the business app ecosystem

    Vaughan Rowsell, Founder and CEO, Vend

    Big data and Analytics - the Revenue boosters

    Sheen Chungath

    A CIO's Guide to Investing in a Data Strategy

    Srikant Gokulnatha,

    2015: The Year of Reckoning for BYOD

    Ojas Rege, VP Strategy, MobileIron

    BYOD Policies: Securing Corporate Data in Today's Mobile World

    Brian Reed, CMO, Good Technology

    right

    Mobile Delights- and Dangers

    Graham Welch, Director-Cisco Security, Cisco

    Tweet
    content-image

    Graham Welch, Director-Cisco Security, Cisco

    As a consumer watching from a far, the announcement of new smartphones and other mobile devices coming out of the annual Mobile World Congress in Barcelona this year fill me with excitement. After all who can fail to be impressed by the sophistication and capabilities of the newest gadgets and technology unveiled at this world leading show?

    But as a security expert I have a sense of foreboding about what all these new devices mean to the poor hard-pressed Chief Security Officer (CSO) in governments and businesses worldwide.

    The world of the security team was relatively easy in days gone by when most people used desk bound PCs and mobile phones were something you needed to go bodybuilding to be able to carry. In those days, cyber criminals were often just geeky teenagers trying to show off to their mates rather than the well-resourced and highly sophisticated criminal gangs of today.

    As the transition away from relatively easy to manage corporate laptops and desk-bound computers, personal tablets and smartphones gathers pace, it's no surprise that hackers are choosing these mobile devices as their next target. It makes economic sense and they are simply 'following the mobile money'.

    “Given the lack of even basic visibility, most IT security teams certainly don't have the capability to identify potential threats from these devices”

    The issue with employee-owned mobile devices is that they access corporate resources outside of the control of the corporate IT team. So it can be difficult to identify even basic environmental data for these devices, such as the number and type of devices being used, and the operating systems and applications.

    In addition mobile malware is growing, which further increases risk. Research from Cisco indicates that 99 percent of malicious attacks on mobiles in

    2013 occurred on devices running Google's Android operating system. Given the lack of even basic visibility, most IT security teams certainly don't have the capability to identify potential threats from these devices.

    But banning mobile devices outright from the corporate environment is neither desirable nor practical. After all they bring all kinds of benefits to the company. But the security team needs to begin to gain the information security advantage and must be able to see everything in their environment. Only with visibility can they understand whether a device is a risk and then protect against it.

    For most enterprises, the right solution is to implement Bring Your Own Device (BYOD) policies that clearly define the proper use of employee-owned devices in the enterprise.

    In order to maintain control of the network:

    • First, identify technologies that provide visibility into everything on the network - devices, operating systems, applications, users, network behaviors, files as well as threats and vulnerabilities. With this baseline of information they can track mobile device usage and applications, and identify potential security policy violations.

    • Second, enterprises should leverage technologies that help apply security intelligence to data so that they can better understand risk. From there, it's possible to evaluate mobile applications to determine if they are malware, and even identify vulnerabilities and attacks targeting mobile assets.

    • Third, identify agile technologies that allow the company to adapt quickly and take action to protect systems in rapidly changing mobile environments. Enterprises need to create and enforce policies that regulate what data can be transmitted to BYOD users.

    • For employee owned devices it may be useful to lock down your organization's network or computers (laptops, desktops, servers) with capabilities like application control. Consider approved applications that can be used by employees to remotely access their desktop computers back in the office form their tablet while travelling. While they may not be able to limit the installation of an application on the device, they can prevent it from running on corporate-owned computers.

    At the end of the day, security of mobile devices is ultimately a question of three phases:

    • Before - establishing control over how mobile devices are used and what data they can access or carry

    • During - Visibility and intelligence is vital if security professionals can hope to identify the threats and risky devices and monitor their activities on the corporate network

    • After - when the inevitable happens and the network is compromised by a threat, this is the ability to retrospectively review how that threat entered the network; which systems it interacted with, and what files and applications were run to ensure it can be cleaned up as quickly as possible.

    There's no doubt that adoption of mobile devices in the workplace presents a challenge that is as much a question of policy and control as it is of technology alone. However, while the trends in mobile device might change from styles and brands, they won't be going away anytime soon. So an increasingly mobile enterprise, where BYOD is the norm, organizations need an increased level of IT security to cope.

    See More: Top Plastic Tech Companies
    tag

    cyber criminals

    Information Security

    Weekly Brief

    loading
    Top 10 Plastic Tech Solution Companies - 2019
    Top 10 Plastic Tech Consulting/Services Companies 2019
    ON THE DECK

    Plastic Tech 2019

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/cxoinsights/mobile-delights-and-dangers-nwid-246.html