Are you suffering from feelings of insecurity? Our latest Web Wise World tutorial can help!
Perhaps nothing is more alarming for IT security managers today than the prospect of the unstoppable BYOD (bring your own device) trend opening multiple backdoors into corporate networks. Each time an employee accesses the enterprise infrastructure using an infected device, an opportunity is created for the infection to spread throughout internal systems.
That's not all. Downloading enterprise information to a mobile device, using enterprise passwords on mobile networks, and duplicative use of enterprise passwords for other sites -- especially social platforms -- creates endless vulnerabilities.
The most secure enterprise infrastructure is potentially under siege, not least because some 11 million Android devices were reported infected by the end of last year.
The scale of the challenge is increased by the sheer diversity of mobile devices roaming the wild: not only laptops and notebooks, but seemingly a new smartphone every week and a new tablet every month. IT departments can hardly be blamed if they fondly recall the days when every employee had a standard, enterprise BlackBerry.
Despair, however, is no solution. It's also unnecessary. Enterprises can take a measured approach to mobile security by:
- Acknowledging the benefits of mobile connectivity, including BYOD
- Keeping abreast of the mobile security environment
- Planning a mobile security strategy
- Communicating policies to employees
- Being aware of solutions and services that can help
I know: A checklist is all very well, but what steps actually need to be taken?
You can fill in the details at our new Web Wise World tutorial on mobile security. In it, we guide you through a series of videos designed to answer questions like:
- What do businesses need to consider when planning their mobile security strategies?
- What are the common challenges that businesses face when trying to secure mobile devices?
- What approaches should SMBs take, as opposed to larger organizations, to secure their mobile devices?
- How does IBM secure its own highly mobile workforce?
We also ask and encourage you to send follow-up questions to the tutor, Latha Maripuri, director of IBM Security Services. Latha manages security services across many key areas, including data security, infrastructure security, and application security, and she's ready to respond to your concerns.
Together with a stack of additional educational resources, including whitepapers and videos, our tutorial is a comprehensive introduction to securing the mobile enterprise.
So watch, learn, please take the poll, and, of course, give us your feedback.
— Kim Davis , Community Editor, Internet Evolution