Data Breaches, Major Hacks and Cybersecurity Threats are a major concern. So how do you protect your business from them?
The Internet of Things has connected billions of devices and machines up to the internet, making them run quicker, allowing data to be analysed and sending more and more data traffic across the internet. However, with this technological advance and the rush to connect all these devices, comes the ability and desire to ‘hack’ into these devices by cybercriminals as an easy way of making money, and security has been very much an afterthought.
So, we need to change the way we operate, prioritising security of devices over and above the need to be able to access real time data or at least balance out the mix so that confidential information cannot be leaked.
Mobile based attacks
The Mobile Device has become the most essential work tool for an employee, and we have seen a major shift away from corporately locked down high grade security blackberries which allowed nothing more than calls and emails, to the ease of using an iphone, using one device for both personal and professional use and downloading numerous applications that require personal data to be accessed.
According to SAP, apps are particularly vulnerable with 84 percent of all attacks happening at the application level, and employees are downloading personal apps on their work approved devices.
Some organisations know they have been breached, while others may have no idea which does not bode well when new regulations enforce 72-hour policies to own up to a breach such as GDPR.
The General Data Protection Regulation (GDPR) comes into force on May 25th 2018, and stipulates that organisations are required to secure all personal data on a mobile device including data in transit from one mobile device to another, to a desktop or an application, together with data being processed.
Organizations will need to look closely at what devices employees are using, what type of data they have and where it is being stored and put mobile management platforms in place if they have not already done so.
What can companies do?
Enterprise Mobility Management solutions can support the balance between efficiency and security. Allowing employees to bring their own devices to work with personal applications but securing the corporate traffic through a separate ‘container’ type application which requires an additional layer of security to access. The data transferred from one device to another is also coded and locked ensuring compliance with the GDP regulation.
Trinity Maxwell are an independent mobile telecoms and mobile security provider of a number of best in breed mobile security partners and if you want to find out more about how we can help then contact us on 0203 137 8450 or email us at firstname.lastname@example.org