New research shows importance of visibility in mobile device strategy

James is editor in chief of TechForge Media, with a passion for how technologies influence business and several Mobile World Congress events under his belt. James has interviewed a variety of leading figures in his career, from former Mafia boss Michael Franzese, to Steve Wozniak, and Jean Michel Jarre. James can be found tweeting at @James_T_Bourne.

A lack of visibility into devices and networks is putting businesses at risk of cyberattacks, according to a new report.

The study, put together by Enterprise Mobility Exchange and NetMotion Software and which polled more than 130 respondents at organisations with corporately owned mobile devices, explored employees' relationships with their devices and networks.

Almost half of mobile workers polled said they spent the majority of their working time connected to non-corporate public Wi-Fi and carrier networks. Of that 50%, more than a quarter said they connected to non-corporate owned networks more than three quarters of the time. 

More than a third (36%) of those polled said they did not provide employees with security training, while almost half (49%) who answered said they could not give a specific figure of mobile security incidents that took place in the previous year.

It is often a two way process; employees have to be aware of best practices, but employers need to get their house in order too. As Tony Pepper, CEO of Egress Software Technologies, wrote for this publication last month: "Building a user-centric solution doesn't mean that we reject technology – quite the opposite – it means that we use technology, in the shape of AI and machine learning, to create a safety net that analyses historical user behaviour to identify when anomalies occur," wrote Pepper.

"Our study showed that it's impossible to devise effective strategies for mitigating mobile security threats if you don't know what devices are doing for a large part of the time they're in use," said Dorene Rettas, managing director of the Enterprise Mobility Exchange. "Moreover, the widespread use of third-party networks creates a blind spot that needs to be addressed in order to make devices truly secure."

You can take a look at the full report here (email required). in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend the Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London and Amsterdam to learn more.

View Comments
Leave a comment

Leave a Reply

Your email address will not be published.