Prevent Mobile Security Threats

The number of workers that now work remotely at least a few days a week has risen significantly with the increasing popularity of mobile devices that make it easier and more convenient for professionals to work remotely. Although mobile devices promote a better work/life balance, the increased use of mobile technology has created new kinds of security threats.

A lot of companies password protect laptops and deploy an antivirus program however; handheld devices often go unprotected and are left open to security threats and other types of intrusion. More organizations are becoming aware of the increased possibility of security threats and are deploying strategies to help prevent intrusion on mobile devices.

Different Types of Mobile Security

  • Network Access Control: Network access control involves the use of a protocol or defined set of rules for user access to a network. Users access a network based on a defined set of security policies that are enforced by an organization. The policies use a protocol to define the device access as well as what the end user can do with the mobile device on the network.
  • Virtual Private Network: Virtual private networks are networks that provide encryption and security applications that ensure only authorized users can access the network. A virtual private network is accessed through a browser and Internet connection and does not require additional software installation on the devices of the end users. Users access and share data securely through the encryption and security applications that are stored on the virtual private network.
  • Organization Devices: The number of workers that use their own handheld devices to connect to the organization network is of growing concern when it comes to security risks. As a result, most organizations are issuing their own devices for the workers to use remotely to access the company network. Although this security method is more costly to implement, the cost of security breaches to sensitive and confidential data outweigh the cost of device implementation.
  • Password Protection: More organizations are password protecting their mobile devices for added security. This is especially important for PDAs because they are capable of holding more data than a cellular phone. The problem with password protection is monitoring workers to ensure that they are abiding by the password protection process and not using shortcuts like programs that automatically log you into the device or program.

Although no system is 100 percent foolproof, most organizations are deploying the security measures discussed here to reduce the chances of mobile security breaches. As more workers start working remotely, organizations will have to come up with additional methods for securing mobile devices and sensitive data as the remote workforce continues to grow.

Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
Identity theft comes in many forms.

A person\92s identity can be 'borrowed' for the purpose of creating fictional credit cards or a person\92s entire identity can be usurped to the point where they can have difficulty proving that they really are who they claim to be.

Up to 18% of identity theft victims take as long as four years to realize that their identity has been stolen.

There are many ways to protect your personal identity and many steps you can take to prevent your identity from being stolen:

*Never give out unnecessary personal information
*Never provide bank details or social security numbers over the Internet
*Always remain aware of who is standing behind you when you type in your personal credit codes at ATM machines and at supermarket checkout swipe machines.