Mobile Security Goes Where No One Has Gone Before

Share:

By George Herbert, on

While the average IT professional deals with cybersecurity on an ongoing basis, mobile security is a new frontier.

Every so often, there’s a change in IT infrastructure that requires data center professionals to adjust their approach. Over the years, infrastructure has shifted from centralized processing to distributed networks (and back again) many times. Environments went from 100 percent wired to hybrid options that included both wired and wireless forms. Within the last 10 to 20 years, traditional brick-and-mortar businesses have needed to adapt to the virtual world. Every time a change in environment occurs, corresponding alterations to infrastructure equipment, network and security must be made. The latest culprits responsible for IT consternation are mobile devices.

If your company has been in business throughout all of these changes, you might be hard-pressed to pick which change felt the most challenging. Keep in mind that the complexity of IT security increased substantially when wireless networks were introduced. This year, due to the sheer volume of mobile devices being used, the number of issues has risen off the charts. Sometimes, this can feel overwhelming, but there are plenty of security strategies you can implement to work efficiently and safely with mobile devices.

Security Concerns With Mobile Devices

No matter the size of the business, mobile devices have a role to play. Managing these ever-evolving mobile technologies in terms of hardware, software and corresponding skills can present many challenges. Whenever you flip through the news, you’re likely to hear a new story about mobile security. Cyberattacks have gone on for many years, but now, portable and wireless devices are introducing new vulnerabilities. The target for a breach may be sensitive business intelligence or a potential portal to a company’s cloud.

Going forward, consider asking these questions of your business:

  • Are the mobile devices owned by the company or by individual users?
  • Are the mobile devices for personal use?
  • Is the security provided by your mobile carrier sufficient?
  • Do you have in-house security skills for mobile devices?
  • Are you satisfied with your management of applications and security settings across these devices?

This is a lot to think about, and mobile computing is highly dynamic, so it’s essential to have experts on hand with the necessary skills to manage a mobile environment.

Topics: , , ,

About The Author

George Herbert

Business Manager for Technical Support Services, IBM

George started at IBM 27 years ago as a customer engineer. Having spent time in almost all aspects of IBM's technical support business, he is currently a member of the IBM GTS Technical Support Services US Offering Development team. His main focus is on education and providing awareness of the TSS portfolio. George is a husband and the father of three amazing girls.