Data Protection Solution: Why mobile data is a risk!
A common thing that sometimes gets over looked with a data protection solution or strategy is mobile data. The reason for this is usually because mobile data is on either a BYOD or personal device; or it is company issued. Admit it; you’ve at least had (or still have) a smartphone that has had work e-mail configured on it.
Mobile data is usually located on devices such as smartphones, tablets (iPads, etc.), laptops. Unfortunately; these types of devices are more relatable and personable than your standard work desktop. They can sometimes feel like they’re an attachment of ourselves.
OK, so you’re probably wondering where we’re going with this? We’re trying to explain why we’re more likely to have a data protection solution for our work PC; but not our ‘work’ devices. The reason for this is that they’re not often looked at as work devices but as personal and not required to be backed up.
Below are reasons why not having a sufficient data protection solution for devices containing company data may be placing you at risk!
Mobile device hacking attempts have a high success rate!
Studies have shown that users are more likely to fall for some for of phishing on a mobile device; compared to their work desktop. It’s no wonder phishing attacks have doubled year on year; they’re effective enough to make it worth while doing.
Reasons why the rate of success is so high on mobile devices is due to the smaller screen; making it harder to identify suspect URL links. Along with the fact that mobile devices are looked at regularly with little attention; users are more likely to throw caution to the wind compared to a desktop.
Company devices are similar to personal devices
The possibilities that portable devices have given to organisations are countless. However; employees will sometimes treat it as a personal device; even though it’s a company device. It’s known that employees will dispose their personal device once given a company issued one.
This is where the grey area creeps in. The device is then used for personal reasons; making it hard to keep track on what’s going on when not being used within the local company network. It’s known that some NSFW sites area a breeding ground for potential breaches and data leaks. Adult content and gambling sites are examples of this. Unprotected (not encrypted) connections to these sites can cause great risks for companies.
Consequently; this leads into our next point.
Lack of visibility
While there are software solutions out there to monitor and check application usage on mobile devices; there are gaps. It’s possible for a mobile device to be used for tasks that aren’t work related; and the monitoring solution be unable to prevent it. It’s best to incorporate a security solution that allows for detection of ill intended activity and prevents any data leak to an unintended third party.
Mobile vulnerabilities are usually public; making them easily exploitable
While no one is denying the benefits of mobile devices on organizations and companies; they also create a larger surface area for weakness and vulnerabilities. Operating system bugs, third party apps and the likeliness of connecting to outside wifi networks are all ways that hackers can gain information from mobile devices.
The best advice for any internal IT or MSP dealing with mobile devices is ‘Be proactive’. Look for flaws and exposure points; before an exploitation occurs. A good way to do this is to include a well rounded, mobile data protection solution.