With our workforce changing and the advent of bring your own device (BYOD) over the last decade, personal security threats are now being transferred to corporate threats. Mobile phones are now able to seamlessly connect and disconnect from corporate systems accessing sensitive data and then connecting to less secure systems – all the while bypassing the same security measures built for Personal Computers.
When discussing mobile security, it best to focus on five basic security flaws: architectural flaws, loss of device, platform system weaknesses, permission problems and application software weakness.
Some of the greatest risks from having a mobile workforce are: user’s willingness to tap the ‘accept’ button on whatever permissions apps request, allowing trojen and other foreign viruses into their devices.
Other large risk factors come from fragmentation of devices amongst colleagues, there are multiple versions of smart devices as a result many people within the same organisation may be using outdated software and apps that are plagued with security breaches.
For more information: