This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

Defend against portable risks

02 November 2011

Responding to research claiming to show that almost a third of executives have rogue mobile devices linked to their organisation's network, Cryptzone says that this a symptom of the falling cost of technology and the increasing use of personal portable devices in the workplace.


According to Grant Taylor, the company’s VP, with the Deloitte research also showing that 87 per cent of respondents thinking that their organisation is at risk of an attack due to a lapse in mobile security, it is clear that the consumerisation of IT – and portable devices in particular – now poses a potentially major security problem.

“Whilst it is perhaps understandable that the lines between personal and business portable device usage is blurring – with employees using their business devices for personal usage - the reverse of personal devices being used for business purposes is something that really needs to be controlled,” he said.

“Far too many organisations allow mobile devices to connect to company services - such as the Intranet or office email systems without the necessary security controls being imposed – often using the simplest means possible, typically on a plug-and-play basis,” he added.

This, he went on to say, is despite the fact that far more stringent security and access controls are imposed on laptops, even though the computing power of the latest dual-core portable devices is far greater than the 10 inch netbooks that were all the rage just a few years ago.

The results of this Deloitte survey, which took in responses from 1200 people, show that it is time that companies started treating mobile devices in the same cautious and secure way they treat laptops, he explained. In fact, says Taylor, even if this means there is a slightly higher security hurdle for mobile device users to negotiate - as long as those hurdles are proportionate to the level of risk involved, then any security-conscious IT professional should implement those controls as a matter of course.

“The sad reality is that most IT security professionals are now only too well aware of the dangers posed by unauthorised mobile devices, yet it is clear from this research that many are unsure what their businesses are doing to counter the risks, which is perhaps understandable given the fact those businesses are failing to recognise the risks they face,” he said.

“This isn't rocket science security either. Just as the technology that allows IT professionals to develop enhanced security for their laptops has existed for some time, so does similar technology to secure against the risks that portable devices now pose the organisation. Extending the security envelope around these portable devices is a relatively easy task – provided the management of the company understands the risks they are running,” he added.


Contact Details and Archive...

Print this page | E-mail this page

http://www.fsifm.com
PFM


MOST VIEWED...

View more articles
Article image

Prevention better than cure where compliancy and PPM is concerned

Industry experts give their response to the question of whether compliance with legislation should be a focus of maintenance procedures....
Article image

Why the Law Says You Need a Nappy Bin Disposal Service

At home, parents are used to disposing of their babies’ used nappies the same way they do any other domestic waste - bagging it up and sticking it in the r...

Benchmarking maintenance

BSRIA has just published this year's operation and maintenance benchmarking report as a guide for building operators to evaluate their performance against ...
Article image

Court action against MoJ after "unfair" contract award

According to The Times, the Ministry of Justice (MoJ) is being sued by Mitie, following claims that it lost out on...
Article image

Altruistic approach opens doors for sharing and gaining knowledge

Leading by example is said to be one of the most effective ways to encourage others to adopt the type of behaviours desired by any organisation and this me...
Article image

Making the Leadenhall Building fit for purpose

Firmly established as one of the most notable buildings in the City of London, the Leadenhall Building (informally known as the cheesegrater) provides a st...