Call us on 0330 332 7933

Where does your organisation fall on the mobile maturity curve?

Reforming your mobility strategy: Where does your organisation fall on the mobile maturity curve?

The four stages of the mobile maturity curve.

Mobility is a journey, and to begin, it’s useful to understand where your organisation falls on the mobile maturity curve. This will help ensure that the solution you choose meets your needs. In BlackBerry’s whitepaper – The CIO’s Guide to EMM – 10 critical decision points, they explore this theme identifying four general stages to the mobile maturity curve.

As your business accelerates along the curve, your mobile approach will become gradually more transformative as you adopt new strategies, incorporate new tools, modify existing business processes, and eventually create entirely new business models. At the same time, security requirements increase as more and more corporate applications become mobilised.

Stage One: Basic Mobility (MDM, Email, & Messaging)

The first investments an organisation typically makes into mobility are mobile device management (MDM) and email. At this point, most enterprises understand that mobility is critical to their business objectives, but they aren’t sure how to tap into it – they lack the tools and expertise to do so.

Moving past basic mobility requires that you:

  • Implement an enterprise mobility management (EMM) solution that lets you secure and control both devices and content.
  • Begin researching mobile security best practices and developing in-house mobile expertise.
  • Acquire knowledge of how mobile devices are used within your business.
  • Build on that knowledge to think about how mobile devices could be used – how might departments collaborate more effectively through mobility?

Stage Two: Mobile Collaboration

Once your users have got a taste of mobile email and messaging, they’ll naturally want to start doing more with their phones. They’ll demand business applications that help them work and collaborate more efficiently. Should you fail to deliver what they require, they’ll seek their own solutions.

The biggest threat at this stage is data leakage, as employees share sensitive files through both first- and third-party apps (often carelessly). User privacy is also an issue, with personal devices being used more and more frequently in the workplace.

There are three key challenges here:

  • Ensuring the applications your employees rely on will work with their mobile devices.
  • Implementing a document control solution that allows you to protect sensitive files against mishandling.
  • Looking beyond company-wide collaboration to think about how mobility slots into key business processes – for example, a sales department’s CRM platform or a hospital’s communications system.

Stage Three: Mobilisation of Existing Business Processes

In stage three, you’ve moved beyond simple collaboration, and there’s a push for mobile apps and initiatives to improve the operations of specific departments. IT, meanwhile, has begun identifying efficiency bottlenecks that could be solved with mobile apps. You may also be looking into internal application development.

The hurdles you’ll face in stage three include:

  • Storing, managing and securing the new forms of data that emerge as a result of mobilisation.
  • Protecting business-critical files and data from criminals and unscrupulous competitors by ensuring mobile employees have a secure means of accessing corporate systems/records.
  • Incorporating mobile applications into existing infrastructure.
  • Ensuring your mobility initiatives keep with both security regulations and your own security baselines.

Stage Four: Creation of New Business Processes

By now, you’re re-engineering your business around mobility. New revenue streams have begun to emerge, and you’re constantly seeking ways to further improve existing business processes, lowering costs, improving efficiency, and heightening customer satisfaction.  An example of this in practice can be seen with Canadian insurance firm Northbridge Financial, which equips its claims professionals with the Encircle platform to better enable them in the field.

Mobility at this stage is pervasive. Mobile devices have become so widespread that managing them individually is inefficient, and your business is flooded by hundreds of different applications – including custom, internal apps. Corporate data, meanwhile, is everywhere.

To ensure you reap all the benefits of mobile maturity, there are a few goals you must accomplish:

  • Set up a platform that enables your business to quickly and securely build and deploy any apps it requires without having to reinvent the wheel.
  • Implement file-centric digital rights management (DRM) that gives you complete control over sensitive documents.
  • Shift from device-centric to user-centric authentication through an identity and access management solution, with single sign-on authentication for mobile apps.

To learn more about where you are on your mobility journey and the solutions that will support your enterprise, download the white paper


Up next

Are you a prime target for cybercriminals?

Mobile usage is maturing and so are the types of threats your company data is being exposed to. This week we ran a webinar in partnership with Wandera titled. Are hackers targeting your data?

David Renwick, Director, Product Advocacy, Wandera delivered a very insightful presentation, helping the audience understand the complex world of mobile attacks and the steps you can take to prevent them. The webinar recording is now available to playback at your own convenience.

Mobile working continues to rise 

Mobile working is now the norm for many organisations – employees are becoming more demanding, expecting to be able to access company information and apps wherever they may be. Fantastic for business productivity but it can also present a challenging environment in which to secure company data and assets.

In this “always on” world where there are more and more apps to keep track of, new OS systems available and around 1.7 billion inputs into our system everyday – keeping track and control of systems can feel impossible. Making sure you have a solution in place to monitor systems and prevent attacks is vital. If you haven’t got an adequate security solution in place the chances are attackers are attempting to access your data right now!

Understanding the types of threats you could be exposed to

Mobile attackers are becoming ever more sophisticated – they are not interested in targeting one single device but rather using this as a route to gaining access to wider company and customer data and financial information.

A reason mobile attacks are on the rise is due to the multiple avenues that mobile devices create for attackers – it’s important to understand the different threats that there are and the types of attacks that can occur:

  • Device threats – these include jailbreaks, outdates OS, malicious profiles. In the case of a malicious profile this could occur by rerouting email in order to perform surveillance.
  • App threats – PII leaks from approved apps, ad servers and APIs. One example of such a threat is XCcodeGhost producer which extracts data from legitimate apps.
  • Web threats – includes malicious sites and apps, browser exploits, phishing and spam. One example is card crypt – this can intercept financial data on mobiles and data that is not encrypted across browsers and apps.
  • Infrastructure threats – man in the middle attacks, rogue hotspots, certificate spoofs, wifi, phishing and public cloud apps. A man in the middle attack – the user is unaware that they have actually connected to rogue wifi allowing hackers to observe their connections.

With so many points of entry available to attackers makes it easier to appreciate why a multi-level security solution is needed that provides deep visibility and control of mobile data.

Education is key

Educating your workforce is another key area to consider in the battle against mobile attacks. Do your employees really understand the impact an attack could have on your business? Are you sure you understand what they do with company information? Do you have a fit for purpose IT policy in place?

Can you afford to be a victim?

The reality is that companies cannot afford to ignore the need to secure mobiles – 28% of US businesses have suffered a mobile breach, the average cost to resolve it was $250,000! Not to mention the damage done to your brand and reputation.