Securing Mobile devices in the Business Environment:
Introduction:
Today,mobile devices are becoming important in everyone’s life and these are playing a crucial role in peoples life and work.smart phones and tablets are used by people as work tools in place of desktops.Now-a-days,there is a rapid increase of usage of mobile devices in business and enterprises for their growth.Features of mobile devices is changing a lot and because of those some features threats are also increasing.security issues are becoming complicate towards mobile devices.
Especially in business places,mobile devices playing key role.Firstly,blackberry is used for most of the business purposes for long years and then increase of smartphones and tablets,such as iphone and android are also used in business purposes.Many companies allowing mobile devices into business and allowing of mobile devices into work place bringing some security risks to business.
Some advantages and risks of using mobile devices in workplace:
Mobile devices helps employees to communicate easily with colleagues and business partners regarding business information.Use of mobile devices also helps in communicating with customers to increase their efficiency and customers satisfaction.By allowing employees to use their mobile devices,helps companies to reduce and save their IT spending.
Business organisations and companies have to provide security to mobile devices of their employees,because their device has their personal data
The CSO or CIO should establish policies as to what data is allowed to be stored on mobile devices, what level of protection is required, and what access to internal systems various mobile devices can have. Regularly, these policies are part of the overall data management and access management policies. The network administrator and IT manager usually decide on which tools to use to ensure that password, virtual private network, access control, and malware protection requirements are followed. They may also decide on which types of mobile devices are authorized for use with company data and services. Managers and users are responsible for following these policies. It is tempting for employees to use personal devices with forbidden data and
The inappropriate disclosure or misuse of sensitive information by an employee may result in financial considerations and legal consequences for an organization. “Mobile devices provide all kinds of new scenarios for business data to go missing, be shared with others, or be stolen. You need to go into BYOD thinking this way, not just for everyday activity, but also when employees move on from your organization” (Arnold, n.d.).
This article gives a synopsis of threats to the mobile devices and the data existing in them and the available defenses. It classifies seven different types of threats on mobile devices and then it discusses about the precautions that can be taken to avoid these threats. It recommends how to prioritize the different threats and defenses.
However mobile devices also represent a significant risk to information security and data security as, if the appropriate security applications and procedures are not applied, they can be a conduit for unauthorized access to the Eastern Widgets’ data and IT infrastructure. This can subsequently lead to data leakage and system infection. Eastern Widgets has a requirement to protect its information assets in order to safeguard its customers, intellectual property and reputation. This policy outlines a set of practices and requirements for the safe use of mobile devices.
Mobile computing is the important information system infrastructure. Organization information system mainly get very good benefits from the Mobile computing. From work place and the normal can interact with Mobile computer is made possible by portable computer hardware, software, communication systems that a non-mobile organization information system. The accessibility, improves information quality, enhance management effectiveness all this potentially strategic technology is getting from Mobile computing. I am presenting the detail analysis, by using elucidate and support these asserted benefits of Mobile computing in the organizations. In additionally, a set of MOBILE framework information developed. I am explaining the benefits like defining the types of problems, opportunities and directives of Mobile computing. I am explaining History and efficiency of mobile computing. And I am explaining its business implications.
Smart phone are contributing in health care they are invented. Internet base mobile devices are also connected to social media. Using smartphone while on duty is not unprofessional until it is used under the limits of the agency and HIPAA. If we are using smartphone, which is beneficial
When it comes to security, most mobile devices are a target waiting to be attacked.
Human factors influence polices in the BYOD practice in the workplace because for the most part employees are comfortable and prefer using their own devices compared to company issued devices as they can often multitask between personal and business access. The use of mobile devices comes with the consequences of the device being stolen, lost and exposed to threats. The possibility of these devices falling in the wrong hands or stranger not authorized access to data could result to harmful software application being uploaded or downloaded which could infect the device and compromise the network.
Other types of risks could be the using of personal device at work. This principle is known as BYOD. BYOD is an IT policy where employees are allowed or encouraged to use their personal mobile device such as phones, tablets, and laptops to access enterprise data and systems. BYOD can expose a company network, and easily attract more attackers. Not only this kind of principle help the company, but it also can cause a serious security breach. Data theft is at high vulnerability when employees are using mobile devices, and particularly their own to share data, access company information, or neglect to change mobile passwords. It is important that a company that allows its employees to use their own devices to list BYOD in their risks list. To
A stolen or lost laptop or mobile device can result in a very unfortunate situation depending on what that device contained, especially if the device contains customer information. To make sure this doesn’t happen, protecting the customers’ data when transporting it anyplace on a portable device by encrypting all the data that remains in it. There is always a potentiality threat of an inside employee. However, to help prevent this, an organization should arrange all the crucial functions and responsibilities amongst employees within the organization. This will limit the possibility of an individual committing fraud without the help of other employees. Lastly, organizations should become aware of phishing. Phishing consists of cyber criminals hacking and hijacking corporate social media accounts or creating confusingly similar nicknames, misleading companies or individuals. This could cause employees or consumers to reveal sensitive information because they believe they are communicating with the “official”
Many companies in United States and around the world have started to worry about the iPhone usage and how much they are becoming dependent by organizations in order to conduct their business. Landman (2010) stated, “The threat from accidental or malicious misuse by employees is a significant threat to business” (p. 14). For this reason, using an iPhone in the workplace is putting companies on alert because the owner of the iPhone can store volatile information about their place where they work. Any information about the company such as e-mails, photos, and other digital evidence used in the work place could be sent to their competitors and used against the company itself and these are real life dangers in the corporate world.
Thesis; Along with the efficiency mobile devices render, come along its risks, in which raises substantial security and privacy concerns. It’s important to be aware of the possible threats a mobile can have, along with knowing what and how to secure information, as well as trying to prevent threats from happening.
According to the U.S. Department of Homeland Security in the article Cyber Threats to Mobile Phones, phones are now sharing hardware and software similar to a PC and becoming each time more like a PC. Therefore, the risks of being hacked are increasing, allowing hackers to attack mobile devices the same way as if they were doing it with a regular PC. Personal and professional information are more often stored on mobile devices therefore it is imperative to have our data secure. Security solutions for mobile devices are not as broad or high-tech as those for PCs. The majority of mobile security relies on the proper use and smart choices that the user makes on a daily basis to be protected against cyber attacks. Even the most careful person can be attacked but the possibilities of that happening are less when you are proactive.
Mobile computing has infiltrated every area of our planet and personal lives. We have become so dependent upon our mobile devices they are often referred to as our third limb. Regardless of race, color, creed or location, mobile technology has shrunk the entire world into the palm of our hands. Mobile technology has made research, communication with our friends and family, education, entertainment and even banking possible to do on the go.
REPORT ON ICT INFRASTUCTURE, EFFECTIVE IMPLEMANTION OF MOBILE APPLICATION WITH ANY OPERATTING SYSTEM WITH SECURITY FEATURES AND COSTING