Published/updated: February 2007
For as long as businesses have been considering mobile working, the concern topping everyone’s list has been security. In the early days, the questions and uncertainties related to the technology, but as experience has been gained and solutions have matured, realisation is dawning that the greatest risks are associated not with the technology per se, but with how it is deployed and used.
Only 1 in 5 say users have a consistently good attitude towards mobile security
A recent series of online workshops and surveys gathering input from both IT and business professionals revealed that the attitude of mobile users to security is either poor or variable in 80% of organisations.
But poor attitudes to security cannot be blamed on the users themselves
Ignorance and lack of risk awareness are the root causes of user related security issues. With the right kind of instruction delivered in the right kind of manner, users can be encouraged to develop a responsible attitude. Those delivering mobility related training in a classroom based environment, for example, are 4 times more likely to have created a consistently good attitude towards mobile security among their users.
When instructing users, it is necessary to brief them on all of the risks
While the trigger for providing security related advice and guidance is often the issuing of a new device to a user, the risks associated with mobile working go beyond single applications and pieces of equipment. Potential exposures can arise from behaviour that users may not always think of as risky. Frequently overlooked or ill-considered risks include the eavesdropping of mobile phone conversations in public places, the inadvertent display of confidential information on notebook screens to fellow travellers, and the invitation to snoopers and highjackers made when devices are improperly configured or WiFi networking is used in an inappropriate manner.
Simple approaches are more effective, so solving the problem is far from onerous
Of course it is possible to build extensive libraries of policies and procedures and devise in-depth training courses on the dangers of mobile working and how to deal with them. In most cases, however, this is not just unnecessary, but counter productive. The golden rule is that the fewer things you ask users to remember, the more chance there will be of them actually remembering and practising them. Relatively simple instructions, tips and guidelines are therefore far more effective.
Mobile security cannot be achieved through technology measures alone as user behaviour has a significant impact on the level of exposure. The danger is that security savvy IT staff often fail to appreciate that the risks and how to deal with them are not always obvious to the average user. The reality is that secure mobile working is dependent on users receiving the right kind of instruction.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
email@example.com or call +44 (0)1425 626501 / 620008
By Tony Lock
VMware Virtual Volumes (VVOLs) are due to be released in 2015 and have been designed to help streamline deployment, make ongoing administration of VMs more straightforward, and to allow each VM to be managed individually. ...more
By Dale Vile
With the flash storage market developing rapidly it’s important to understand the nature of the technology. This paper looks at the role of flash storage in the modern data centre and examines some of the practicalities you need to consider when evaluating options. ...more
By Dale Vile
By Dale Vile
Creating a more customer centric business environment has historically been hard to achieve. In this paper, we will examine how technology and market trends, together with changes in the regulatory landscape, are elevating the status of customer centricity from ‘aspirational ideal’ to ‘business critical imperative’. ...more
By Dale Vile, Tony Lock, Jack Vile
With the phenomenal rise in the adoption of smartphones, tablets and other desirable devices, many pundits predict that the direction of corporate IT will increasingly be defined by end users. But does this make sense? ...more
By Dale Vile & Tony Lock
If it has been a while since you thought about your DR measures, or a review has been prompted by a risk assessment, compliance audit, actual disaster or some other scare, it’s worth taking some time to understand what can be achieved in light of important changes that have taken place over the past few years. ...more
By Tony Lock
With the advent of digitisation, all public sector environments generate and capture a significant amount of electronic data. Against this background, this paper explores how to manage costs and risks while meeting these changing needs through ‘active archiving’. ...more