{"id":4323,"date":"2015-12-13T10:24:05","date_gmt":"2015-12-13T16:24:05","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4323"},"modified":"2015-11-30T13:35:06","modified_gmt":"2015-11-30T19:35:06","slug":"how-has-mobile-technology-impacted-data-security","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/how-has-mobile-technology-impacted-data-security\/","title":{"rendered":"How Has Mobile Technology Impacted Data Security?"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\">Mobile technology has fundamentally changed the way day to day business is carried out \u2013 of this there is little doubt. No longer is business restricted to the place of work or normal working hours. Conference calls can be made from almost anywhere, emails can be sent and received, and files can be shared with anyone in the world with the touch of a thumb.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">However, with this new(ish) technology comes new concerns for IT professionals. The portable nature of smartphones and tablets makes them prime targets for loss or theft and the increasing reliance on WI-FI hotspots makes data interception a real possibility. This is compounded by the fact that many people use their personal devices for work purposes, which are much harder for IT teams to monitor and control.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In the past the biggest concern was that a laptop may be stolen and hacked for the data contained within, however all of that changed with the advent of mobile technology. So, with that in mind let\u2019s look at the ways in which mobile technology has impacted data security.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Bring Your Own Devices (BYOD)<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana, geneva, sans-serif;\">Employees using their own devices for work purposes poses many challenges for IT personnel. The biggest of these is making sure that corporate information remains secure.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Wit<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4328 alignleft\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/12\/datasecurity_hacker.png\" alt=\"datasecurity_hacker\" width=\"185\" height=\"185\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/12\/datasecurity_hacker.png 185w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/12\/datasecurity_hacker-150x150.png 150w\" sizes=\"auto, (max-width: 185px) 100vw, 185px\">h personal devices it is very difficult for IT staff to track and control access to corporate and private networks as employees use their devices for both business and personal tasks. This is compounded by the fact that it is impossible to monitor and control the applications that people have installed on their own devices. Malware is rife in mobile applications and this raises massive concerns for the security of corporate data.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In fact, most IT professionals agree that careless employees pose a greater threat to corporate security than cybercriminals.<br>\n<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Another issue is that, in order to keep business running smoothly, IT staff need to make sure that all of the relevant software is kept updated. However, it can be incredibly difficult to do this when people have a multitude of devices that are often changed or upgraded on a regular basis.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">This is especially true for smaller businesses, many of which have no active policy for managing corporate data on personal devices.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>High Cost of Failure<\/b><\/span><span style=\"font-family: verdana, geneva, sans-serif;\">\u00a0<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">It is almost an inevitability these days that, once companies have implemented mobile devices, security incidents will happen. And when they do, the costs can be significant with the price of a breach ranging from between $10,000 and $500,000. Whilst this may seem like a high price it makes sense when you consider the staff hours that need to be designated to resolving the issue, along with legal fees, fines and other resolution processes. Rather unsurprisingly, this cost rises with the size of the company.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">File Sharing<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">With mobile technology has come the adoption of file sharing sites to allow for easy and rapid distribution of material. Whilst some companies do limit access to sites such as DropBox or Google Drive, it is rare for these policies to be enforced strictly.<br>\n<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Obviously not knowing exactly where and when files are being shared online poses concern for those involved in data security. Whilst in-house file sharing methods can be closely monitored<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4327 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/12\/datasecurity_lockedfolder.png\" alt=\"datasecurity_lockedfolder\" width=\"185\" height=\"185\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/12\/datasecurity_lockedfolder.png 185w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/12\/datasecurity_lockedfolder-150x150.png 150w\" sizes=\"auto, (max-width: 185px) 100vw, 185px\">, the same is not true for external sites. With data being spread across multiple sites it becomes nearly impossible for IT staff to keep track of where everything is located and they obviously\u00a0cannot vouch for the security of external sites and applications.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Comparing Mobile Platforms<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana, geneva, sans-serif;\">Android mobile systems are by far the most popular of devices, but they are also by far the least trustworthy when it comes to data security. This is mainly because Android has a much more open marketplace with a far laxer policy to vetting apps that are made available therein.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Also Android allows for the installation of non-marketplace apps, which is where the greatest threat from malware comes. Many Android users know to make sure that they have anti-virus software installed on their devices, just as they would their PC \u2013 but a large proportion still view their smartphones as phones and not computers (which is what they clearly are).<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Apple, Windows Mobile and Blackberry devices are far more trusted when it comes to security for the same reasons that Android are not. The more closed nature of their marketplaces and more rigorous vetting process keeps the bad apps away. Combine this with the fact that they don\u2019t allow installation of non-marketplace applications, makes them a far less stressful option for businesses.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">In Conclusion<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">While mobile devices clearly have mu<a name=\"_GoBack\"><\/a>ch to offer businesses in terms of convenience and productivity, they have also created new and complex security concerns for those that use them. As the technology develops and we become more familiar with them, security will undoubtedly become more sophisticated alongside them.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Does your business use mobile devices and does it allow BYOD? Please let us know of any security concerns that you have that we have not mentioned.<\/b><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><b>Have fun.<\/b><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile technology has fundamentally changed the way day to day business is carried out \u2013 of this there is little doubt. No longer is business restricted to the place of work or normal working hours. Conference calls can be made from almost anywhere, emails can be sent and received, and files can be shared with [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4327,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13,6],"tags":[],"class_list":["post-4323","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4323"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4323\/revisions"}],"predecessor-version":[{"id":4332,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4323\/revisions\/4332"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4327"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}