MOBILE IS THE NEW TARGET
It’s safe to say that the future of computers and communication lies not in the conventional desktop, but with mobile devices like smartphones, tablets, and laptops. The ease of operation, the single point benefits they offer, their price effectiveness, and their size make them a hot favorite, ideal to use from any place that provides an internet connection. The proliferation of software and applications too has done its bit for this form of computing. Organizations too have joined the fray, equipping their employees with smart handheld devices connected to the organization network. The Internet of Things (IoT) has contributed its bit to the proliferation. It is estimated that by 2025, there will be 75 billion ‘things’ connected to the internet.
But what is often overlooked in the euphoria of the smart benefits, is the fact that mobile devices are one of the fastest-growing attack spaces for hackers and cybercriminals.
The threat is tangible
Finances Online’s statistics report?(1) ?says that laptops, mobile phones, and tablets are the most vulnerable to cybercrimes, ahead of wireless access points, servers, and routers.
Forbes?(2) ??categorically states that while on the one hand, the increase in mobility has revolutionized the way we do business, it has, on the other hand, also created new security risks. A 2021 article says that Small Businesses – one of the main targets after corporates – are majorly unprepared to prevent, detect or respond to cyberattacks. The article alludes to a general feeling on the part of these businesses that hackers would not bother to waste time in a cyberattack. The reverse is actually true, with hackers having a field day.
What’s alarming is that it takes the hacking of just one device for a hacker to not only get access to the individual’s data but also gain access to the company network via the hacked device.
Why mobile devices are being targeted?
Here are some of the reasons that mobile devices are targeted.
Stepping up Mobile Security
Mobile Security solutions can obviously have untold benefits for an organization. From safeguarding organization devices from malicious advertisers and keeping viruses and Trojans at bay to providing upgrades and patches that keep devices battle-ready in the event of an attack, to safeguarding confidential data and even automatically deleting data from a lost device, to using industry-standard virus protection, to providing VPN-enabled internet access, mobile security is more than ever the need of the hour.
领英推荐
Organizations would need to do the following:
Forbes suggests a solution that takes care of the following types of protection:
Best Practices in mobile security
An interesting development in mobile security is imminent for personnel using Government-Furnished Equipment (GFE) mobile devices. The Cybersecurity and Infrastructure Security Agency?(4) ?(CISA) reports that their Cyber Quality Services Management Office (QSMO) will offer mobile cybersecurity shared services to minimize risks inherent in the GFE devices due to the sensitive nature of activities of their personnel. The first is Mobile Application Vetting (MAV) which facilitates security integrity checks of government-developed and third-party mobile apps. The second is Traveler-Verified Information Protection (T-VIP) which makes comparisons of pre-travel and post-travel scans of the GFE devices and identifies suspicious changes on the devices made during their personnel’s travels during diplomatic and other missions/travels. CISA calls these game-changing developments to augment mobile security.
MAV and T-VIP could arguably lead the way for the development of similar mobile security measures for the industry at large.
Outlook
With the ease of operation that they offer amongst other benefits, one cannot see any change in the pattern of mobile device usage. However, a good sign is that organizations are taking the threat to mobile devices seriously and stepping up their mobile security initiatives. Hopefully, this mindset will also rub on to individual users so that they do not fall prey to the burgeoning lot of hackers out there looking to make hay while the cyber sun shines!
References
Management Consulting firm | Growth Hacking | Global B2B Conference | Brand Architecture | Business Experience |Business Process Automation | Software Solutions
1 年Philip, thanks for sharing!