In order to comply with the new working model, CISOs will need to make ‘mobile security’ a priority on a much broader scale to prepare for future challenges. Josh Neame, Technology Director at BlueFort Security, suggests ways that CISOs should be rethinking how they approach ‘mobile security’ to ensure their organisation is both productive and secure in 2021.
The Coronavirus pandemic has had a significant impact on many aspects of the economy. But while many businesses have been focusing on maintaining operations in the face of remote working and changing consumer demands, threat actors around the world have been capitalising on the crisis.
Deloitte points out that its Cyber Intelligence Centre has observed a spike in phishing attacks, Malspams and ransomware, with threat actors using COVID-19 as bait to mislead employees – many of whom are now working remotely, beyond the confines of the corporate network and using a variety of mobile devices.
CISOs are now facing a host of new security challenges brought on by the rapid deployment of tools, technologies and processes that enabled people to work remotely. Many of these changes happened in a matter of days and the rushed nature of the rollout now poses some major data security issues. The ‘new normal’ has changed both the scope and definition of how CISOs will need to think about ‘mobile security’ going into 2021.
The risk of insider threat is not a new one. However, the shift in working practices, associated devices and locations is making it far easier for these types of threat to go unnoticed – whether they’re malicious or just a simple mistake. The mobile nature of the new IT environment means CISOs will need to consider a range of new tools and processes. Here we look at three ways CISOs should be rethinking how they approach ‘mobile security’ to ensure their organisation is both productive and secure in 2021.
- The proliferation of mobile devices
With more employees now working on mobile devices, the key question for CISOs is: are the devices my employees are using properly secured? The proliferation of mobile devices widens the organisation’s potential attack…