Call us on 0330 332 7933

Mobile a low security risk? Think again!

People need to be able to collaborate and work remotely easily in today’s working world. What many organisations do not realise are the security risks this creates for the leakage of corporate data via mobile devices, which could prove to be a very expensive and also embarrassing situation to clean up.

The new threats

With access to millions of WiFi hotspots and apps that leak PII (personally identifiable information) mobile security threats have never been more real.  Hackers have shifted their focus from desktops to mobile devices and traditional web security solutions.

We were reminded all about the threats to mobile security at our Rethink Tech event last week when Aatish Pattni from Check Point discussed the increased sophistication of cyber threats including hidden, polymorphic and multiple entry point attackers and how they access company assets.

Hidden threats

Mobile devices are both in communication with the organisation and with the backend enterprise systems. Much of the discussion about mobile security focuses on the risk of the data being downloaded from these devices, but there is an even greater risk arising from the verification data on the device, which is used to access backend systems.

For example, if an organisation’s MDM is used to set up VPN connections to internal networks from smartphones or tablets, and users use ActiveSync to access the server, then these devices have the keys to open the VPN connections to all networks and the passwords to gain access to any machine on that network. If the PIN code of the device is compromised, which can happen within 60 seconds, there is a risk for information on the entire corporate network.

Do you have the tools and technology to be secure?

Here at Intercity Technology we help many organisations protect information of mobile devices that could be used for subsequent attacks. Our mobile device management solutions allow the right controls to be placed on identity, applications and data.

However, mobile device management does not go far enough to protect against the multiple threat vectors mobile devices are faced with. Through our partner Wandera, we can provide a higher level of security for mobile data, both protecting devices from data loss as well as malicious sites and man-in-the-middle attacks.

Because the business use of mobile devices is rising, the need for mobile security will only increase, and become increasingly more complex. IT departments and management should recognise the risks and prepare their organisations for threats against their corporate data, customer data and their reputation.

For more information register for our upcoming webinar on June 14th presented by Suzan Sakarya, Wandera:

Call us to learn more.

Up next

8 ways to up your communications game

2016 seems to be flying by! But before you slip into pre-holiday work panic mode, we wanted to share a few of our latest blogs for you to mull over. Here’s a quick digest of some of our latest and greatest updates:

1. 10 critical decision points to consider when formulating your mobile strategy.

Ask us about the latest guide from our partner BlackBerry The CIO’s Guide to Enterprise Mobility Management.

2. Keep track of your data usage

Find out how you can control and monitor your data usage on your mobile and avoid any horrible surprises when you receive your bill! Read here 

3. Mobile working uncovered

Maria Grant, Intercity’s Product Director, recently spoke with and answered a number of key questions around mobile working. Read here 

4. Beware man in the middle!

Rob Lawlor discusses how Man-in-the-Middle attacks work and the steps your business can take to protect yourself against them. Read here 

5. From vision to reality

Read our latest blog from Chris Mealing. An interesting look at how the NHS are moving closer to making a digital vision a reality. Read here

6. Unified comms – back to basics

Read our latest blog by James Hone to understand how to get the basics right for unified communications and why it’s important. Read here 

7. Mobility and the cloud – essentials for export success

Rob Lawlor was interviewed Export Experts magazine recently and in the interview he discussed why technology offers businesses scalable solutions and is a key enabler when it comes to expansion. Rob also talked about how mobile technology and cloud computing are crucial elements when it comes to the growth of export markets. Read the full interview here

8. Communications solutions in action

Read our latest case studies, including Pillsbury, Nugent Care and Royal Mint,  to see how the right solutions are impacting business performance for our customers view here.