Cyber Security in the Mobile World – Part 2

Connectivity to the Internet, usability, and portability are what makes mobile devices important from a business perspective. Corporate infrastructure also gives considerable risk. New risks have been incorporated at the infrastructure, application and device levels in the past decade and this is calling for changes in the security strategy and policy. In addition, organizations face many challenges when executing security programs associated with mobile devices.

Mobile security challenges are puffed up by lack of security policies governing the use of data, training, security awareness and insufficient security controls to shield sensitive data. Regrettably, conventional anti-spyware and anti-virus programs have not really address the needs of mobile devices. In addition, mobile-based anti-virus solutions that are largely based on file patterns can frequently be unproductive when malware is custom designed.

In order to solidify the mobile platform and prevent compromise or infection, definite configuration baselines need to be developed. Furthermore, network oriented detection/prevention mechanisms and traditional end-point security have failed to address the security prerequisites of mobile devices.

Consequently, in an attempt to prevent infection and proliferation of malware through mobile devices, an extensive assessment and a sandboxed environment must be executed on the device.

Cyber Security in the Mobile World – Part 3

(3 raters, 13 scores, average: 4.33 out of 5)
Cyber Security in the Mobile World – Part 2

Featured Posts

Posted in News Tagged with: ,