Published/updated: February 2007
For as long as businesses have been considering mobile working, the concern topping everyone’s list has been security. In the early days, the questions and uncertainties related to the technology, but as experience has been gained and solutions have matured, realisation is dawning that the greatest risks are associated not with the technology per se, but with how it is deployed and used.
Only 1 in 5 say users have a consistently good attitude towards mobile security
A recent series of online workshops and surveys gathering input from both IT and business professionals revealed that the attitude of mobile users to security is either poor or variable in 80% of organisations.
But poor attitudes to security cannot be blamed on the users themselves
Ignorance and lack of risk awareness are the root causes of user related security issues. With the right kind of instruction delivered in the right kind of manner, users can be encouraged to develop a responsible attitude. Those delivering mobility related training in a classroom based environment, for example, are 4 times more likely to have created a consistently good attitude towards mobile security among their users.
When instructing users, it is necessary to brief them on all of the risks
While the trigger for providing security related advice and guidance is often the issuing of a new device to a user, the risks associated with mobile working go beyond single applications and pieces of equipment. Potential exposures can arise from behaviour that users may not always think of as risky. Frequently overlooked or ill-considered risks include the eavesdropping of mobile phone conversations in public places, the inadvertent display of confidential information on notebook screens to fellow travellers, and the invitation to snoopers and highjackers made when devices are improperly configured or WiFi networking is used in an inappropriate manner.
Simple approaches are more effective, so solving the problem is far from onerous
Of course it is possible to build extensive libraries of policies and procedures and devise in-depth training courses on the dangers of mobile working and how to deal with them. In most cases, however, this is not just unnecessary, but counter productive. The golden rule is that the fewer things you ask users to remember, the more chance there will be of them actually remembering and practising them. Relatively simple instructions, tips and guidelines are therefore far more effective.
Mobile security cannot be achieved through technology measures alone as user behaviour has a significant impact on the level of exposure. The danger is that security savvy IT staff often fail to appreciate that the risks and how to deal with them are not always obvious to the average user. The reality is that secure mobile working is dependent on users receiving the right kind of instruction.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
email@example.com or call +44 (0)1425 626501 / 620008
By Dale Vile and Tony Lock
It’s easy to be caught out by a cyber attack or internal mistake that leads to your customers’ data or important intellectual property ending up on the black market. Making sure your business is adequately protected and is able to respond effectively to a security incident ...more
By Dale Vile Tony Lock & Jack Vile
Application programming interfaces (APIs) have been around for decades. In the early days of IT they were primarily used to give programmers convenient access to libraries of prebuilt functions. As systems became more distributed, APIs found their place ...more
By Dale Vile & Jack Vile
The world we live in is increasingly digital. As the smart use of technology leads to markets speeding up and becoming ever more unpredictable, a strong set of established offerings and execution capabilities only gets you so far. Feedback from 1,442 IT ...more
By Dale Vile
Advances in digital technology create significant opportunities to transform both customer engagement and business operations. As the trends in these areas continue, feedback from 1,442 respondents in a recent survey highlight 10 key traits of the highest achievers. ...more
By Dale Vile
IT infrastructures are often coping pretty well with current business requirements, but many IT professionals are aware that new and changing needs will lead to future capability gaps. They also know that more of the same is not the answer ...more
By Dale Vile
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever. Relying on manual processes and scripts, or ad hoc piecemeal automation, is not sustainable ...more
By Dale Vile
A perennial problem with storage is how to deal with escalating requirements in a smooth, manageable and non-disruptive manner. By removing many of the traditional limits on system expansion, Ceph based configurations ...more
By Dale Vile
Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define the future of end user computing. Most organisations today, however, see a role for both company and employee owned equipment to meet the wide and varied range of needs ...more