19/12/2013
Mobile device challenges facing businesses today
Vancouver, Canada
“Managing cyber-security is more than just responding to external hacking attacks and if a business doesn’t have the infrastructure in place to combat external threats, is it in a position to ensure the security and strength of its corporate digital infrastructure? If an employee is using their own smartphone or tablet and it happens to contain malware or unauthorised applications, then this can represent a security vulnerability. Given that a work-enabled mobile device has access to as much sensitive data as a desktop PC, a compromised portable device could pose as much of a threat as a successful hacking attack.
“Whether through unauthorised applications or device usage, data security threats don’t just stop at cyber-security hacking risks. Successful security policies need to offer a holistic approach, encompassing all potential security risks, including smartphones and tablets. However, the challenge for businesses is to give employees the freedom to use their own devices, but without compromising security and productivity.”