First published: February 2007
For as long as businesses have been considering mobile working, the concern topping everyone’s list has been security. In the early days, the questions and uncertainties related to the technology, but as experience has been gained and solutions have matured, realisation is dawning that the greatest risks are associated not with the technology per se, but with how it is deployed and used.
Only 1 in 5 say users have a consistently good attitude towards mobile security
A recent series of online workshops and surveys gathering input from both IT and business professionals revealed that the attitude of mobile users to security is either poor or variable in 80% of organisations.
But poor attitudes to security cannot be blamed on the users themselves
Ignorance and lack of risk awareness are the root causes of user related security issues. With the right kind of instruction delivered in the right kind of manner, users can be encouraged to develop a responsible attitude. Those delivering mobility related training in a classroom based environment, for example, are 4 times more likely to have created a consistently good attitude towards mobile security among their users.
When instructing users, it is necessary to brief them on all of the risks
While the trigger for providing security related advice and guidance is often the issuing of a new device to a user, the risks associated with mobile working go beyond single applications and pieces of equipment. Potential exposures can arise from behaviour that users may not always think of as risky. Frequently overlooked or ill-considered risks include the eavesdropping of mobile phone conversations in public places, the inadvertent display of confidential information on notebook screens to fellow travellers, and the invitation to snoopers and highjackers made when devices are improperly configured or WiFi networking is used in an inappropriate manner.
Simple approaches are more effective, so solving the problem is far from onerous
Of course it is possible to build extensive libraries of policies and procedures and devise in-depth training courses on the dangers of mobile working and how to deal with them. In most cases, however, this is not just unnecessary, but counter productive. The golden rule is that the fewer things you ask users to remember, the more chance there will be of them actually remembering and practising them. Relatively simple instructions, tips and guidelines are therefore far more effective.
Mobile security cannot be achieved through technology measures alone as user behaviour has a significant impact on the level of exposure. The danger is that security savvy IT staff often fail to appreciate that the risks and how to deal with them are not always obvious to the average user. The reality is that secure mobile working is dependent on users receiving the right kind of instruction.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
email@example.com or call +44 (0)1425 626501 / 620008
By Dale Vile, Jack Vile, Tony Lock
This paper is written for business executives and managers with an interest in how technology is used within the workforce, particularly equipment such as smartphones, tablets and desktop or notebook computers ...more
By Dale Vile, Tony Lock, Jack Vile
With the phenomenal rise in the adoption of smartphones, tablets and other desirable devices, many pundits predict that the direction of corporate IT will increasingly be defined by end users. But does this make sense? ...more
By Dale Vile
By Dale Vile
Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard to know where to focus your efforts ...more
By Tony Lock
While the importance of business information is almost universally recognised, few organisations have enjoyed either the time or the resources required to ensure that the data they store across an expanding range of computer systems is adequately protected. ...more
By Dale Vile
With more departmental applications, collaboration and sharing environments, and even cloud-based services, with access via desktops, laptops, tablets and smartphones, are we in danger of losing control of our business information? ...more
By Dale Vile
Cloud computing, and Software as a Service (SaaS) in particular, can in theory deliver a lot of value to small and medium sized businesses, but are the benefits real? If so, how can they be unlocked? ...more