Click me
Transcribed

Mobile Security

Mobile Security Ponemon Mobile Security Survey пп As more and more businesses rely on mobile devices for work it has become apparent that mobile security is the next big trend in IT security. Despite people's rampant usage of mobile devices, many companies don't have the right security measures in place. 76% 77% 39% Amount of people who view mobile technology as essential Lax mobile security could lead to a variety of problems, and it's important for business owners and IT workers implement proper mobile security measures. If you want to learn about mobile security keep this infographic handy I Amont of people who think mobile usage could negatively impact security Amount of people with mobile securitv measures in olace IAITAM MOBILE SECURITY SURVEY RESULTS Forty-nine percent of respondents said they require the use of device-level security settings in the workplace. Fifty-one percent of survey- takers said their organization has experienced a data breach due to insecure devices. Ninety-six percent think that organizations will be forced to alter the way they manage their mobile assets as more and more But only 6% said employees are actually compliant. Fifteen percent said they weren't even sure if they were. This number may be even higher, 23% said they weren't really sure whether they have or not. types of devices are added to the mobile ecosystem. SIX FACTORS FOR MOBILE SECURITY If you want to achieve mobile IT security you'll want to employ location specific capabilities. Allow some functions and not others depending on the reported location or access point or method of the mobile device. LOCATION You can easily add biometrics to mobile devices. They will provide your organization a higher level of authentication than a logon ID and password alone. SIGNIN IDENTITY AND ACCESS MANAGEMENT With access management, a user who normally accesses sensitive services from their office laptop can be challenged to re-authenticate before accessing the same data and services from a mobile device. Identitų and access management systems can also be leveraged to automate and track account changes. ENCRYPTED VOICE AND TEXT Encrypting text is increasingly important. Sensitive information should be encrypted, and there are any array of methods and devices you can use to ensure that only the right people are seeing your sensitive information. With the advent of bring your own device (BYOD), your business may need to add cellular network service or WiFi. It is critical that this extension of your organization's INFRASTRUCTURE infrastructure be well understood in terms of securitų risks and appropriate defenses like firewalls and the previously mentioned identity and access management. SITUATIONAL AWARENESS Today's advanced persistent threats linger very slowly and make the smallest of moves over months, perhaps even years. You need to see everything in context that gets onto your systems and traverses your infrastructure. You need to be able to establish patterns and define normal. Brought to you by: ntiGrow HELPING YOU GROW http://www.intigrow.com/

Mobile Security

shared by mloshe234 on Jun 11
284 views
1 shares
0 comments
Mobile computing has opened up a whole new window of opportunities for businesses in this day and age. However, with these new opportunities come new challenges. Listed here are some of the many mobil...

Publisher

Mike Loshe

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size