Technology Blogs by Members
Explore a vibrant mix of technical expertise, industry insights, and tech buzz in member blogs covering SAP products, technology, and events. Get in the mix!
cancel
Showing results for 
Search instead for 
Did you mean: 
Former Member
0 Kudos

How did previous generations ever get anything accomplished?

Over the past twenty-five years, the span of a single human generation, we have transformed our communication and workplace behaviors. Complex activities that once may have taken weeks to finish can now be completed within minutes.

Unfortunately, our most advanced smartphones and tablets – and the data we create and share on these tools – arehighly vulnerable to cyber attacks. According to recent reports, black-hat hackers are increasing their attacks on mobile devices. This threat is garnering international attention.

“Political leaders around the world, including President Obama,” writes Juniper Networks CEO Kevin Johnson, “have begun calling for a greater focus on [mobile security]… A typical security breach costs a business more than a half a million dollars to address in terms of cash outlays, business disruption, and revenue losses….” Fortunately, most IT security teams are developing strategies to eradicate this threat.

Building a Mobile IT Security Strategy

For most organizations, “the challenge,” writes IT security specialist Mark Bouchard, “is [understanding] how to enable productivity and mitigate the threats, vulnerabilities, and risks in a way that strikes the best balance and the lowest total costs.”

In a whitepaper authored for Websense, Bouchard – founder of the IT research and analysis companyAimPoint Group– details a three-tier plan that secures the two critical points: corporate data and mobile devices.


Implementing the Plan

But a sound IT security strategy is only the beginning. Organizations need to police their IT environment and educate mobile users. The first step is standard practice; the second is frequently overlooked or many times, poorly implemented – and often is the cause of mu....

When mobile users don’t understand usage policies, or worse, when these policies are inflexible to the point of interfering with productivity, users will most likely ignore the rules. And when they do, they are not simply making themselves vulnerable to attack: They are potentiallyputting an entire network at risk. How?

Most IT attacks result from user actions. To prevent cyber attacks, users need to change their patterns of mobile behavior. To help them, organizations can offer programs in self-directed education and group training; they can also develop clearly defined mobile-security policies and run top-level mobile IT security apps. These measures can help prevent cyber attacks. In the struggle to stop unauthorized users from gaining access to critical networks – and extracting and exploiting crucial business information – IT executives must use every option available to them to persuade their organization’s mobile users to both follow standardized policies and act vigilantly in protecting their data and guarding their devices.

Is your company implementing any of the strategic tiers that Bouchard suggests? Does it have clearly defined mobile usage policies? Does it offer user education? Does the organization’s culture continuously promote adherence to these policies?

This post was originally published by the author on SAP’s Business Innovation blog.

Labels in this area