The following five recommendations provide a basis for managing mobile enterprise risks today and planning for the future.
After understanding the risks, organisations must determine what tools and techniques are available for mitigating them. This segment outlines the current state of mobile enterprise security, with the caveat that technology solutions and security practices are evolving quickly.
The fact of the matter is that security professionals don’t have a choice. They must determine how to manage mobile risks. The first step is to build a comprehensive understanding of those risks. Mobile computing poses the same types of risks as PCs and other computing models, albeit with a mobile twist.
In most organisations, mobile devices are used primarily for email, calendar, and contacts, which have typically been delivered on company-supplied BlackBerry devices. Increasingly, organisations are delivering these applications on consumer smartphones and tablets, mainly Apple® iOS devices, Android™ devices, and Microsoft® Windows® Phone devices. And they are also moving beyond email to an expanding array of mobile enterprise apps. Read more.
As more and more consumer devices connect to enterprise networks and store corporate data, risks continue to increase. Potentially devastating consequences include massive confidential data loss and ruinous security breaches. Security professionals can’t just ignore the risks or they’ll put their organisations in peril. But they also can’t say “no” or they’ll face the wrath of users and stand in the way of huge potential business benefits. The challenges may seem daunting, but the SBIC have put together this full report based on their discussions on balancing the risks and rewards of consumer devices to help you.
- 22 Experts Share How to Communicate Security Program Effectiveness to Upper Management : Download Now
- Emerging Cyber Threat Summit | Cybersecurity strategy for business leaders in the digital age | 6-8 June | Sydney | Get the agenda
- Everything You Need to Know About Cyber Threats But Were Too Afraid To Ask: Download Now
- Translating Security Leadership into Board Value : Download Now
- Security Exhibition & Conference | Intelligent Strategies for Australia’s Security Industry 26-28 July 2017 | ICC Sydney, Darling Harbour | Find out more
- Advanced endpoint protection test report : Download Now
- Network Professionals Survey with Computerworld Australia Enter this survey and you could WIN one (1) of two (2) Microsoft Surface Pro 4 128GB Tablet valued at AU$999 each. *Terms & Conditions Apply