Mobile Security

Gain full visibility and control over mobile user activity

The increase in capabilities of the latest generations of mobile devices are converting them from portable email clients to viable desktop replacements and the centre piece of modern information knowledge work. In some cases, such as Windows 10 devices, there is literally no difference between a tablet and a desktop, except the form factor.

Unfortunately, hackers don’t really care about the form factor: From their point of view, mobile devices are just an organisation’s desktop that don’t have the extensive protection of a corporate perimeter – they’re increasingly easy pickings. With increasing numbers of people accessing and creating documents on the go through Office 365 and Google Apps, these devices have equal level of access to sensitive corporate information, and require equivalent protection.

Mobile devices require all the same protections that a desktop is offered. This includes:

  • Anti-malware and/or application whitelisting: Not only are app stores not as safe as they purport, applications can be side-loaded, and vulnerabilities such as BlueBorne have demonstrated – arbitrary code can be introduced through remote code execution vulnerabilities.
  • Encryption of sensitive files: Even when users don’t use tablets and phones to store files, sensitive information can be insecurely cached from email, web and chat programs. In addition, often users will download a file for a review, and forget that it’s in their downloaded files folder. These can easily be used by criminals who either have remote access, or physical access to the mobile device;
  • Remote management capability: Originally known as mobile device management, the ability to push down software and enforce security policy (such as pin/password complexity) still remains as relevant today.

Traditional mobile device management is still good, but no longer sufficient. Mobile security management needs to treat all of your mobile devices in the same manner as non-mobile devices, because they expose the same security risks (if not higher).

If you’re not sure whether your mobile strategy is having a negative impact on your security posture, contact Content Security for an obligation free chat, and review some of our strategies to help you go mobile more safely.

Contact us to learn more

38013021_l.jpg

Contact us today

info@contentsecurity.com.au

Call us

1300 659 964

Offices

Sydney:

Level 1 Suite 1.06, 1 Epping Road, NSW 2113 

Melbourne:

Level 4 Suite 430, 838 Collins Street, VIC 3008

Brisbane:

Level 3, 231 George Street, QLD 4000

Request a today

Subscribe to our newsletter