Prepare for mobile threats in 2014

Share this article:
Scott Totzke, senior vice president, BlackBerry Security Group
Scott Totzke, senior vice president, BlackBerry Security Group

Last year there were escalating concerns over cyber attacks as both corporations and governments fell prey to online adversaries. As mobile devices are further integrated into networks, organizations will have a critical need to implement end-to-end security solutions that offer comprehensive security at the device, server and network level in order to provide a multi-layered security solution that will better protect their corporate assets.

With so much sensitive information including patient records, customer credit card numbers, usernames and passwords, databases and financial records at stake, a patchwork solution will never be sufficient for protecting a mobile computing environment. Too many organizations learned that lesson the hard way in 2013, and now in 2014, the trend will be toward more robust security features and controls that allow organizations to leverage their investments in mobility solutions to drive new ways of transacting with their customers.

To help avoid and thwart attacks, organizations should employ a solution that can proactively identify malicious applications as well as recognize those that are designed to erode the privacy of user data on the device, and then deny access to the network. Strong encryption of data between end points in a communication chain will help ensure that data in motion and on devices remains secure. And in the case of a lost or stolen device, organizations will need the ability to manage or wipe devices remotely.

The cost of a cyber attack can far outweigh the expense of transitioning to a best-in-class solution with comprehensive management and security for devices. With the ability to control the devices, apps and content – and manage them from a single unified console – your IT team can save significant time and resources during the training and transitioning phase. 

Take time to develop and implement a formal enterprise mobility management strategy for your organization in 2014 — it will help detect where the vulnerabilities are and leave you better prepared to protect your network from an attack.
Share this article:

Sign up to our newsletters

More in Opinions

Unfair competition: Proactive preemption can save you from litigation

Unfair competition: Proactive preemption can save you ...

With each job change, the risk that the new hire will bring confidential information or trade secrets with him or her to the new company grows.

Hackers only need to get it right once, we need to get it right every time

Hackers only need to get it right once, ...

Hackers only need to find one weak point to steal valuable information. On the flip side, security pros need to account for every possible scenario.

Successful strategies for continuous response

Successful strategies for continuous response

While it isn't realistic for organizations to expect that it will never happen to them, a rapid, professional and continuous response can limit their scope and reputational impact.