This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

Defend against portable risks

02 November 2011

Responding to research claiming to show that almost a third of executives have rogue mobile devices linked to their organisation's network, Cryptzone says that this a symptom of the falling cost of technology and the increasing use of personal portable devices in the workplace.

According to Grant Taylor, the company’s VP, with the Deloitte research also showing that 87 per cent of respondents thinking that their organisation is at risk of an attack due to a lapse in mobile security, it is clear that the consumerisation of IT – and portable devices in particular – now poses a potentially major security problem.

“Whilst it is perhaps understandable that the lines between personal and business portable device usage is blurring – with employees using their business devices for personal usage - the reverse of personal devices being used for business purposes is something that really needs to be controlled,” he said.

“Far too many organisations allow mobile devices to connect to company services - such as the Intranet or office email systems without the necessary security controls being imposed – often using the simplest means possible, typically on a plug-and-play basis,” he added.

This, he went on to say, is despite the fact that far more stringent security and access controls are imposed on laptops, even though the computing power of the latest dual-core portable devices is far greater than the 10 inch netbooks that were all the rage just a few years ago.

The results of this Deloitte survey, which took in responses from 1200 people, show that it is time that companies started treating mobile devices in the same cautious and secure way they treat laptops, he explained. In fact, says Taylor, even if this means there is a slightly higher security hurdle for mobile device users to negotiate - as long as those hurdles are proportionate to the level of risk involved, then any security-conscious IT professional should implement those controls as a matter of course.

“The sad reality is that most IT security professionals are now only too well aware of the dangers posed by unauthorised mobile devices, yet it is clear from this research that many are unsure what their businesses are doing to counter the risks, which is perhaps understandable given the fact those businesses are failing to recognise the risks they face,” he said.

“This isn't rocket science security either. Just as the technology that allows IT professionals to develop enhanced security for their laptops has existed for some time, so does similar technology to secure against the risks that portable devices now pose the organisation. Extending the security envelope around these portable devices is a relatively easy task – provided the management of the company understands the risks they are running,” he added.

Contact Details and Archive...

Print this page | E-mail this page


View more articles
Article image

Why the Law Says You Need a Nappy Bin Disposal Service

At home, parents are used to disposing of their babies’ used nappies the same way they do any other domestic waste - bagging it up and sticking it in the r...
Article image

Center Parcs goes cashless with Systopia

Systopia, which deals with cashless payment systems, has secured a contract with UK Short Break Operator Center Parcs to provide cashless payment systems i...
Article image

Emerging trends within the FM employment market

Recruitment specialist and PFM Awards Young Leader of the Year sponsor Boden Group shares its overview of the FM employment market as the industry returns ...

Measuring FM Performance

Counting costs rather than measuring performance and demonstrating value to business is one of the reasons why FM has failed to achieve a strategic role in...

SFG20 updated and online

A new, updated and interactive version of SFG20 - Standard Maintenance Specification for Building Services - has been launched as a web based service which...
Article image

Will FM cope with hybrid working?

With all eyes set on June 21st, and rising questions around whether the final phase of restrictions will be lifted, business owners are beginning to think ...