Skip to main content

10 mobile security myths that need debunking

Securing mobile devices is a continuing challenge for enterprises as they deploy more mobile applications. In some cases, security risks are overblown; in others, they are underestimated. What myths about mobile security should IT security managers be aware of? Read my essay now!

1: Mobile devices don't need encryption

A surprising number of companies don't implement data encryption on mobile devices. If these devices are being used as thin clients only, with enterprise data being stored in the cloud, there is less need for encryption. However, more and more mobile devices store contacts lists, photos, price lists, sales notes, and other sensitive information. The localized storage enables field-based personnel to keep working even if the cloud becomes unavailable. For these reasons alone, encryption should more widely considered.

2: Wearables don't need to have security practices applied

Wearable devices are just beginning to make an entry into enterprises. In early applications, they are used for things like capturing photos of crime scenes in police work and photos of equipment in the field that needs repair and must be referred to an internal company expert. However, less than 60% of these devices are secured, according to a recent Tech Pro Research mobile security report. As more of these devices are dispensed for field operations, IT might need to rethink this.

3: It's okay to skip mobile security evaluations in IT audits

When it comes to mobile devices, organizations tend to focus their mobile security audits on the network and its centralized monitoring and downloads to these devices. They should also focus security audits on employee mobile device practices in the field and on the security measures that are resident on devices themselves.

4: Mobile devices are inherently less secure than desktop devices

Mobile device security doesn't have to be less robust than the security found on desktops. In some cases (such as the ability to track and shut down mobile devices remotely), mobile devices might even be more secure. Mobile devices also have small data footprints, using the cloud to store data, so they are unlike "fat client" laptop counterparts that have hard drives full of data. As a result, less data may be exposed to security breaches on mobile devices.

5: BYOD devices promote lax security practices

This isn't necessarily the case. If IT has firm guidelines for qualifying which mobile devices will be accepted in its BYOD program, coupled with usage practices and IT security practices that are uniformly enabled, monitored, and administered on these devices, BYOD can be just as secure as enterprise-issued mobile devices.

6: Mobile devices have more security software vulnerabilities

Mobile devices do not have any more software security vulnerabilities than desktop computers. The difference is that mobile devices are in the field, so IT has to enact a centralized method of delivering new security and software patches down to these devices from the network as soon as patches are available.

7: Mobile devices don't need two-factor authentication

Mobile devices are prone to being misplaced or lost, so the additional security sign-in code that goes beyond just user ID and password can help to secure them. It's advisable for all mobile devices to use two-factor authentication, which require a secret signing code (e.g., where you went to high school) as well as a user ID and password for access.

8: Laptops are less vulnerable to security breaches than tablets and mobiles

Laptops and desktops in the office aren't necessarily more secure than mobile devices. A primary reason is that many laptops and desktops still contain resident hard drives that store sensitive data. This creates greater risk that data can be stolen, comprised, or shared with unauthorized users.

9: Desktop PCs and laptops don't get lost

Laptops and desktops do get lost, although not at the same rates as mobile devices. Even five years ago, lost laptops were costing organizations $18 billion annually—and the problem still exists today. IT should track this equipment with asset management software and other measures, in the same way it tracks lost or misplaced mobile devices.

10: Public app stores are safe

Smaller companies lacking their own network infrastructures for downloads will sometimes use public app stores to effect these downloads to their users—and in many cases, companies of all sizes will use public app stores to download handy applications to their end customers. These app stores have taken numerous precautions to ensure that downloads are safe and secure—but it doesn't mean that they don't experience security breaches, malware threats, and hacks. The best policy (especially for internal application downloads) is to create your own download procedures that your network administrator directly oversees.


Popular posts from this blog

How to Write Great Deductive Essays

When writing, say, for various science subjects, not least medicine, it is important to be able to think in a logical manner. And there are few assignments that demonstrate logic better than writing a deductive essay. When tasked with this type of assignment, you may well wonder what the process involves. What is meant by deduction, evidence, premise and conclusion, for example? Why are they essential in these papers? While deductive writing cannot teach people logical thinking, we are able to provide guidance that should help you write better deductive essays. The process of deduction is a bit similar to puzzle solving; only it is in written form. Consult your tutor before beginning an assignment of this type to see what style of argumentation is expected e.g. whether they want the propositional or categorical type. Once you have all needed information, you are ready to begin writing. Be careful about dividing your writing into numerous parts because this can disrupt the smooth flow

DIY Christmas Gifts, Decorations, and Displays

There’s always room for another decoration or one more gift! So, if you’re looking for some holiday inspiration, you’ve come to the right place. Here are five of our favorite DIY Christmas gifts, decorations, and displays to bring the holidays into your home. This simple cabinet decoration will be making an appearance at my home this year. Finding another “spot” for decorations can be tricky, but what better location for all of your Christmas cards than the kitchen?! It is a universal gathering place! With just a few yards of ribbon and some tape, you can mimic this card display, too. Wooden signs are a simple holiday decoration that can be featured on your front porch this year. The best part? You can use BOTH sides of the wood, and have decorations for back-to-back holidays—that way you don’t have to pack and unpack each season. Use any colors or words you like, and enjoy! It happens more often than I’d like to admit, but when headed to a holiday party or get-together, I often

5 Bullying Prevention Tips from an Expert

Is your child being bullied? Here are five bullying prevention tips to help you understand why some students decide to pick on other kids. 1. The Classic Bully Was a Victim First Hurt people, Hurt people. People who have been hurt in the past, and do not go through some sort of healing process, often either hurt other people in the same way or they let the hurting action continue to happen. Healed people, heal people. It’s best to help students talk to caring adults about their hurts so they can heal emotionally from their pain. Talking to a counselor will help to strengthen a student’s emotional health. Many students care about physical strength training but often disregard the importance of being emotionally healthy. Emotionally healthy students stabilize the class and the school culture. 2. Victim Mentality vs. Leadership Mentality People who have been hurt and haven’t gone through any healing process often carry a victim mentality, and rightly so. When a pe