Intelligent CISO Issue 20 | Page 50

FEATURE Finding a solution that secures the entirety of the workforce while effectively integrating with existing security infrastructure can be a difficult task. Mobile technologies are becoming strategically important for manufacturing enterprises, with mobility and cybersecurity being two of the top technology priorities for industrial manufacturing CEOs, according to PwC’s 18th Annual Global CEO Survey. As the manufacturing industry becomes increasingly dependent on mobile devices to remain connected and productive, the cybersecurity threat landscape will only continue to expand. Humans are often the weakest link in cybersecurity – a fact that has never been truer when it comes to mobile phishing attacks. As a result, phishing and content protection on Humans are often the weakest link in cybersecurity – a fact that has never been truer when it comes to mobile phishing attacks. 50 mobile devices should inspect any URL requests from both corporate and personal email, SMS texts, messaging platforms and web browsers, blocking requests from anything identified as potentially malicious. Mobile endpoint security should offer visibility into an organisation’s entire spectrum of mobile risk and apply policies to reduce threat levels. Industrial manufacturing organisations are often held accountable to certain regulations that require ongoing compliance with cybersecurity regulations. As a result, mobile security tools need to provide continuous visibility and risk reporting on all devices connecting to the corporate network. Continuous assessment of risk means that if a device ever exceeds the accepted levels of risk set by security teams, then access to the corporate network and data will be restricted until the user brings the device back into compliance. Despite all these challenges, security is becoming an important concern and priority for manufacturers. These businesses are facing a rapid expansion in their mobile workforce which depends on mobile devices to work offsite, deliver on projects and boost efficiency in the field. Typically, manufacturers deploy various security controls, including Enterprise Mobile Management (EMM) software to filter access to corporate resources and a Security Information and Event Management (SIEM) product to gather security data. Finding a solution that secures the entirety of the workforce while effectively integrating with existing security infrastructure can be a difficult task. To tackle this, having regular user awareness training is strongly advised to help the workforce understand the potential dangers of clicking or opening an unusual link or attachment. This will help to reduce the threat of the company being hit by a potential phishing attack. In order to efficiently protect critical assets, manufacturing organisations would be well advised to implement a comprehensive Mobile Threat Defence (MTD) that incorporates dedicated phishing and content protection. In doing so, the business will effectively secure their rapidly growing mobile workforce, enable the business to gain immediate visibility into mobile security while reducing the risk posture of their mobile users. This will ultimately ensure that mobile technology within the company is seen as a benefit instead of a security risk. u Issue 20 | www.intelligentciso.com