FEATURE
Finding a solution
that secures
the entirety of
the workforce
while effectively
integrating with
existing security
infrastructure can be
a difficult task.
Mobile technologies are becoming
strategically important for manufacturing
enterprises, with mobility and
cybersecurity being two of the top
technology priorities for industrial
manufacturing CEOs, according to
PwC’s 18th Annual Global CEO Survey.
As the manufacturing industry becomes
increasingly dependent on mobile
devices to remain connected and
productive, the cybersecurity threat
landscape will only continue to expand.
Humans are often the weakest link
in cybersecurity – a fact that has
never been truer when it comes to
mobile phishing attacks. As a result,
phishing and content protection on
Humans are often
the weakest link in
cybersecurity – a
fact that has never
been truer when it
comes to mobile
phishing attacks.
50
mobile devices should inspect any
URL requests from both corporate and
personal email, SMS texts, messaging
platforms and web browsers, blocking
requests from anything identified as
potentially malicious. Mobile endpoint
security should offer visibility into
an organisation’s entire spectrum
of mobile risk and apply policies to
reduce threat levels.
Industrial manufacturing organisations
are often held accountable to certain
regulations that require ongoing
compliance with cybersecurity
regulations. As a result, mobile security
tools need to provide continuous
visibility and risk reporting on all
devices connecting to the corporate
network. Continuous assessment
of risk means that if a device ever
exceeds the accepted levels of risk
set by security teams, then access to
the corporate network and data will
be restricted until the user brings the
device back into compliance.
Despite all these challenges, security
is becoming an important concern
and priority for manufacturers. These
businesses are facing a rapid expansion
in their mobile workforce which depends
on mobile devices to work offsite, deliver
on projects and boost efficiency in the
field. Typically, manufacturers deploy
various security controls, including
Enterprise Mobile Management (EMM)
software to filter access to corporate
resources and a Security Information
and Event Management (SIEM) product
to gather security data.
Finding a solution that secures the
entirety of the workforce while effectively
integrating with existing security
infrastructure can be a difficult task.
To tackle this, having regular user
awareness training is strongly advised
to help the workforce understand the
potential dangers of clicking or opening
an unusual link or attachment.
This will help to reduce the threat of
the company being hit by a potential
phishing attack. In order to efficiently
protect critical assets, manufacturing
organisations would be well advised
to implement a comprehensive Mobile
Threat Defence (MTD) that
incorporates dedicated phishing and
content protection.
In doing so, the business will effectively
secure their rapidly growing mobile
workforce, enable the business to gain
immediate visibility into mobile security
while reducing the risk posture of
their mobile users. This will ultimately
ensure that mobile technology within the
company is seen as a benefit instead of
a security risk. u
Issue 20
|
www.intelligentciso.com