MOBILE
SECURITY
THE NEW CYBER PROTECTION IMPERATIVE
By Bob Stevens, Vice President Americas, Lookout
THE BIGGEST threat to organizational data is in your hand. Many
of the same threats to the security of PCs apply to mobile devices,
yet many agencies only deploy mobile device management systems,
leaving their data and mobile endpoints vulnerable to attacks.
From phishing campaigns to network attacks to malicious applications,
attackers are increasingly focused on mobile devices that carry
sensitive information outside the traditional security perimeter.
With the expectation of privacy soaring and many agencies
exploring BYOD (bring your own device) programs, the desire
to empower employees to work anywhere is met with the
challenge of securing data and the networks they access.
Unsecured devices increase risk to both individuals and government.
For individuals, this threat carries the risk of compromised personal
data. For government, the stakes can be higher. In our recent
survey, over 60 percent of government agencies have experienced
a security incident involving a mobile device, and the rise in the
number of phishing incidents has increased dramatically.
There are precautionary measures users can take: checking download
sources, reviewing app permissions, keeping software updated.
Well-formed passwords—at least eight characters long, with a
combination of letters, numbers, and symbols—all contribute to
enhanced security. These are important and part of any responsible
security policy. Other threats, such as browser-based phishing, are
more sophisticated, often existing within different applications. They
are effectively invisible to the end-user and a challenge to prevent.
Technology and security solutions continue to evolve as threats multiply. Today,
mobile security offers an effective and accessible solution for an increasingly
complex mobile security threat matrix through an app-based solution.
48 • CESGovernment.com