How To Secure Your Organization’s Mobile Devices

Today, cybercriminals and Canadian business leaders share a common challenge: both are trying to figure out how best to leverage Bring-Your-Own-Device (BYOD) and mobility trends to further their operations.

In fact, IDC Canada recently released a report on Canadian mobile habits that revealed Canadians urgently need help to secure their devices.

In the words of IDC Analyst Krista Napier: “The results are in, and they don’t look good: many Canadians are not practicing safe mobile security. But it’s not because they don’t think it’s important, it’s because they are unsure how.”

So how can business leaders ensure that users not only get the personalized, productive experience that they desire but do so in a manageable and secure way? They want to allow mobility and BYOD, but need to manage risk and maintain compliance and security in the face of cybercriminals.

The solution is to address the most significant issues facing a company’s mobile security: the maturation of mobile platforms and the growing use of mobile applications.

As mobile devices mature and perform more like traditional desktop and laptop computers, it becomes easier for criminals to design malware for them. This issue is amplified by the use of mobile applications and devices on unsecured, free wireless networks.

The reality is that while an organization’s security team is grappling with the “any-to-any problem” (how to secure any user, on any device, located anywhere, accessing any application or resource) employees may be putting your data at risk every day.

So what is the solution?

Watch our recent webcast on Keeping up with Secure Mobility.

To meet today’s security challenges head-on, organizations need to examine their security model holistically. In 2013 we reported unprecedented growth in mobile malware threats against specific devices, and these attacks figures are going to increase.This number will climb as mobile malware emerges as a logical area of exploitation for cybercrime.

Before an attack, business leaders must work with IT to institute a formal program for managing mobile devices to ensure that any device is secure before it can access the network.

Many organizations also unknowingly create the potential for a security threat if an employee’s device is lost or stolen, and not secured. Attackers can access intellectual property and other sensitive data through these lost and unsecured devices. Every IT organization should enforce a personal identification number (PIN), an automatic timeout lock, and have the ability to remotely wipe a device if it is lost or stolen. Encryption is also highly recommended as it helps to secure data at rest, and choosing and enforcing minimum operating system (OS) versions helps to limit exposure to known exploits.

Additionally, business leaders need to be aware of how to protect their data beyond mobile devices. And let me be clear – this is not just a concern for IT leaders. When data is stolen, corrupted or lost the entire organization is impacted, and it’s time for business leaders to take notice.

Make sure you are aware of what is on your network – devices, operating systems, users and applications, among others – as that will determine your security strategy and mobile processes. And if an organization is attacked, it is vital to have a formal plan in place that will allow it to determine the scope of the damage, contain the event, remediate and bring operations back to normal as soon as possible.

I encourage you to discover which security solution is right for your business and watch our recent webcast on Keeping up with Secure Mobility.

About Ahmed Etman

Ahmed Etman is the General Manager of Security and Enterprise Networking for Cisco Canada. In this role, he is responsible for Canadian growth within Cisco’s core technologies including enterprise routing, switching, and wireless networking. He is also responsible for managing Cisco’s cross-portfolio security solutions and leads a team of dedicated sales specialists across the country. Etman has over 12 years of experience in the telecommunications industry. He joined Cisco’s Europe, Middle East and Africa team in 2006 as a security business development manager, based in Dubai. He is a mechanical engineer by training and started his career as a security systems engineer. Before joining Cisco, he held various positions at Internet Security Systems (now part of IBM), including Director of Technical Solutions, and was responsible for opening the ISS operation in the Middle East and Africa region. Etman holds a bachelor of science degree from The American University in Cairo. Ahmed Etman est le directeur général de la sécurité et du réseautage d'entreprise de Cisco Canada. À ce titre, il est responsable de la croissance des affaires canadiennes en lien avec les technologies de base de Cisco, notamment les technologies de routage, de commutation et de réseautage sans fil d'entreprise. Il est aussi responsable de la gestion de l'ensemble de la gamme de solutions de sécurité de Cisco et dirige une équipe de spécialistes des ventes dévoués d'un océan à l'autre. M. Etman possède plus de 12 ans d'expérience dans l'industrie des télécommunications. Il est entré au service de l'équipe Cisco de l'Europe, du Moyen-Orient et de l'Afrique en 2006 en tant que directeur du développement des affaires de sécurité affecté à Dubaï. Il a une formation d'ingénieur mécanique et il a commencé sa carrière à titre d'ingénieur de systèmes de sécurité. Avant de grossir les rangs de Cisco, il a occupé divers postes au sein d'Internet Security Systems (qui fait maintenant partie d'IBM), y compris celui de directeur général des solutions techniques. Il a aussi été responsable de la mise sur pied de l'équipe ISS de la région du Moyen-Orient et de l'Afrique. M. Etman est titulaire d'un baccalauréat ès sciences de la American University du Caire.
This entry was posted in Borderless Networks, Security and tagged , , , , , , , , , . Bookmark the permalink.

One Response to How To Secure Your Organization’s Mobile Devices

  1. Pingback: Perception versus Reality: Step Up Your Security Protection in 2015 | Cisco Canada Blog

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s