BlackBerry LIVE Interviews Experts on Mobility and UEM Part 3


It’s a common — and seemingly benign — business situation today:

CFO: “Hey, boss. The latest draft of the financial report for this quarter is ready for you to review.”

CEO: “Great, send it over. I’m on my way to the airport, but I’ll look it over on my phone.”

This innocent, everyday exchange could have serious ramifications for an organization. And most of us are blissfully unaware of the risk.

BlackBerry VP of Global Sales Engineering, Alex Willis, says this is because we don’t see a lot of big data breach headlines related to mobile devices. But that doesn’t mean they aren’t happening all around us, every day. “If credentials are stolen off a phone and then used elsewhere, the report gets tagged to the ‘elsewhere,’ not the phone.”

This failure to recognize or record the source of an attack leads organizations to believe that damaging cyberattacks and breaches do not occur on or through mobile devices, Willis says. “The reality is, that’s not true.” But the perception that our phones are secure creates gaps in many organizations’ cybersecurity defenses, and exposes their valuable data, according to Willis.

In Part 3 of my BlackBerry LIVE interview, I’m speaking with both Willis and Senior Director of Solutions Marketing Baldeep Dogra. Together, we explore the technological aspects of mobile security, including VPN, 2FA, zero trust, and how organizations use BlackBerry® Unified Endpoint Management (UEM) to complement Microsoft® Intune® to fill in security gaps. To learn more, watch the podcast, or read the excerpt below.



Steve Kovsky:


I’m Steve Kovsky. I’m editorial director at BlackBerry, and I’ve got two illustrious colleagues with me. We’re discussing mobility in the workplace, some of the security and usability challenges, and some of the ways that these are being addressed by the four pillars of cybersecurity. Joining me today, Baldeep Dagra, he’s senior director, solutions marketing and Alex Willis, vice president, global sales engineering. Gentlemen, thanks for being with us today.

As a tech journalist and a marketer working in cybersecurity, I’d certainly heard of MDM and maybe even…

Source…