CloudMine.Logo.HiRes.type_1.png
Ë
Blog Home
By 0to5 • October 30, 2015

Three Must-Read Mobile Security Articles

Cybersecurity is the word of the year as hacks into The U.S. Government's Office of Personnel Management, Ashley Madison, and Sony Pictures leaked sensitive data on both individuals and the breached organizations. Fortune Magazine even called Cybersecurity the word of the year for 2015. There's near endless information to consume on the subject and it's hard to weed out the signal from the noise, so we wanted to help you out and provide quality information that's truly worth your time.

 

Here are the three articles we consider to be "must-reads," that will bring you up to speed on security risks, implications and best practices to protect your organization's, employees and customers.

 

THE NEW NORMAL — WE'RE ALL SECURITY COMPANIES NOW

"The Sony hack was a catalyst to a new normal — like it or not, every business is a security company now. Whether you build technology or provide services to consumers or other businesses"¦you are a security company. If there is information inside your company you would never want disclosed"¦you are a security company. If your business collects and stores personal or confidential data of any kind regardless of your vertical"¦you are a security company. It's a fact. Your business is going to get attacked and the threats will only get more sophisticated."

 

GARTNER'S TIPS FOR 'FAILURE PROOF' MOBILE SECURITY

"Many enterprises are struggling to keep up with the mobile behaviour of their employees despite proof points showing support for these behaviours leads to positive organizational change, increased productivity, and overall business growth. Security has been a major barrier to adoption for enterprises tackling mobile and has become a leading topic of conversation among IT leaders."

 

SECURITY AND THE INTERNET OF THINGS: HOW MUCH INFORMATION DO YOUR DEVICES HAVE ON YOU, AND WHO HAS ACCESS?

"The issue at hand is not that hackers will steal the data on your connected toaster and know how often you toast your bread. It's that these connected devices are linked to your home or office wireless connection, creating a potential doorway for them to walk through to gain access to your other devices."

 

LEARN MORE

If you're interested in further exploring mobile security in 2016, take a look at our whitepaper covering mobile attack threats that make you the most vulnerable, how to protect your data, users, and organizations, and easy ways to implement security-enhancing practices.