Saturday, June 3, 2023
News 21 AV
  • Home
  • Tech News
    Ban predictive policing systems in EU AI Act, says civil society

    Insights on Nordic artificial intelligence strategies

    Unionised contract workers who train Google’s AI win pay rise

    Unionised contract workers who train Google’s AI win pay rise

    Government given until autumn 2023 to create technology roadmap to support net-zero strategy

    Government given until autumn 2023 to create technology roadmap to support net-zero strategy

    Ellison-founded sailing league SailGP plumps for Oracle NetSuite to expand

    Ellison-founded sailing league SailGP plumps for Oracle NetSuite to expand

    Cabinet Office looks to expand public data sharing for digital ID

    Cabinet Office looks to expand public data sharing for digital ID

    A pandemic retail trend that’s here to stay?

    LockBit cartel suspected of Royal Mail cyber attack

    Umbrella firm Parasol confirms ‘malicious activity’ as root cause of ongoing systems outage

    Government accused of leaving umbrella company regulation in limbo by shelving enforcement body

    UK government completes trials of age estimation technology

    UK government completes trials of age estimation technology

    Cyber insurance: The good, the bad and the ugly

    Companies warned to step up cyber security to become ‘insurable’

  • Virtual reality
    The other DWI: Driving while immersed

    The other DWI: Driving while immersed

    We tried out Canon's VR calling app Kokomo

    We tried out Canon’s VR calling app Kokomo

    Peacock subscribers can now stream content on Meta Quest devices

    Peacock subscribers can now stream content on Meta Quest devices

    A decade later, this VR treadmill is finally ready to ship

    A decade later, this VR treadmill is finally ready to ship

    How XR Technologies Are Making Design Reviews Immersive | NVIDIA Blog

    How XR Technologies Are Making Design Reviews Immersive | NVIDIA Blog

    Review: PlayStation VR2 is a huge leap that still can't escape its niche

    Review: PlayStation VR2 is a huge leap that still can’t escape its niche

    Meta Quest users can now tap and swipe in VR without controllers

    Meta Quest users can now tap and swipe in VR without controllers

    Former Salesforce exec Bret Taylor is teaming up with Google AR/VR vet Clay Bavor on mystery startup

    Former Salesforce exec Bret Taylor is teaming up with Google AR/VR vet Clay Bavor on mystery startup

    Google’s GV backs SideQuest, an unofficial Meta Quest app store

    Meta’s Reality Labs lost $13.7 billion on VR and AR last year

  • Lifestyle
    JUNTOSO 3 Pieces Recliner Sofa Sets

    How To Choose The Right Velvet Chesterfield Sofa For Your Living Room

    High-End Strollers

    Luxury Redefined: 6 Most Innovative Features in High-End Strollers

    Tips for Caregivers and Inter-abled Partners

    Top Tips for Choosing the Best Senior Living Facilities for You or Your Loved Ones

    Pros and Cons of No-Fault Insurance

    What are Medigap Plans? – Morning Lazziness

    Organizer1

    Organize Your Workspace With Industrial Storage Systems

    coffee

    Caffeine and Beyond: Natural Energy-Boosting Alternatives to Fight Fatigue

    How to Save Money as an Expat

    Staying out of Debt While Living With a Chronic Illness

    CapCut Online Editor

    Powerful Product Demos: Utilizing CapCut Online Editor for Your Business

    hair serum woman

    How To Use Redensyl Hair Growth Serum

  • Beauty
    Water Flosser

    This Bestselling Waterpik Is On Sale Right Now

    Proud To Be Pink Bobbi Brown Gloss Duo

    Proud To Be Pink Bobbi Brown Gloss Duo

    ColourPop x Snitchery Collection Swatches (Eyes & Cheeks)

    ColourPop x Snitchery Collection Swatches (Eyes & Cheeks)

    Image may contain Clothing Apparel Human Person Lingerie and Underwear

    Period Care Ads Are Woefully Lacking in Disability Representation

    mileys new years eve party

    Who Is Maxx Morando? – All About Miley Cyrus’s New Boyfriend

    Dior Cosmic Eyes (359) Eyeshadow Palette

    Dior Holiday 2022 Collection Swatches

    preview for How Emma Stone Became an Oscar-Winning Actress

    Who Is Dave McCary? Meet Emma Stone’s Husband and Baby Girl’s Dad

    Coloured Raine Sunset Chic Eyeshadow Palette Review & Swatches

    Coloured Raine Sunset Chic Eyeshadow Palette Review & Swatches

    Mila Kunis Criticizes Celebs Who Gave Will Smith a Standing Ovation at the Oscars After The Slap

    Mila Kunis Criticizes Celebs Who Gave Will Smith a Standing Ovation at the Oscars After The Slap

  • Health & Fitness
    2023 CrossFit North America West Semifinal Results — Alex Gazan, Patrick Vellner Notch Wins

    2023 CrossFit North America West Semifinal Results — Alex Gazan, Patrick Vellner Notch Wins

    Q&A With Ann Partridge, MD, MPH

    Are Psoriasis and Allergies Linked?

    Lucy Underdown Sets Kratos Bar Deadlift World Record of 305 Kilograms (672.4 Pounds)

    Lucy Underdown Sets Kratos Bar Deadlift World Record of 305 Kilograms (672.4 Pounds)

    Q&A With Ann Partridge, MD, MPH

    Can Statins Cause Brain Fog?

    The 10 Best Medicine Ball Exercises for Power, Conditioning, and More

    The 10 Best Medicine Ball Exercises for Power, Conditioning, and More

    WebMD: Better information. Better health.

    The Nuances of Treating Vitiligo in People of Color

    WebMD: Better information. Better health.

    Build a Care Team You Trust

    Hi-Tech Implant Helps Paralyzed Man Walk More Naturally

    Hi-Tech Implant Helps Paralyzed Man Walk More Naturally

    How to Do the Incline Dumbbell Bench Press for Upper Pec Muscle and Pressing Strength

    How to Do the Incline Dumbbell Bench Press for Upper Pec Muscle and Pressing Strength

  • Equipment
  • Login
No Result
View All Result
News 21 AV
Home Tech News

What are the risks for mobile users?

News 21 AV by News 21 AV
October 19, 2021
in Tech News
0
What are the risks for mobile users?
0
SHARES
1
VIEWS
FacebookTwitter


Millions of people have begun heading back to the office after nearly two years of working from home. While the return of some office-based working is a positive sign that the Covid-19 pandemic is slowly coming to an end, some experts fear that this could have significant cyber security implications for businesses. 

The pandemic has seen vast numbers of people work remotely. And whether or not they had permission from their employers, many workers used personal mobile devices to stay in touch with bosses, colleagues, customers and other key stakeholders during the pandemic. 

Unfortunately, consumer devices aren’t always protected by stringent cyber security defences like corporate electronics are. So, they could potentially harbour malware and other security vulnerabilities. Even if employees only used corporate mobile devices for remote working, they would have been connected to personal Wi-Fi networks and could be less secure as a result. 

Whatever the case, hundreds of thousands of mobile devices – many of which could be potentially insecure – are suddenly reconnecting to corporate networks. What are the risks of this? And how can firms mitigate them?

A cyber security pandemic

The influx of new devices joining corporate networks for the first time will result in major security problems for businesses, says ESET security specialist Jake Moore. “There is simply going to be a deluge of malware and bugs being transferred onto these once secure platforms,” he warns.

To counter these threats, businesses must secure their corporate data and networks. But, according to Moore, this requires multiple layers of security and the cooperation of everyone inside the organisation. It shouldn’t just be left to cyber security teams to handle. 

“Before you allow any non-company-owned devices onto the network, the data must be made secure, and if possible separate with guest networks, secluded sensitive areas and access given to only those who require it,” he says. “If any third-party device enters the network, it is highly advised to ensure a robust, company-approved antivirus solution is on the device and scans are carried out before joining the network.”

Because many employees use mobile devices today, there’s a risk that sensitive business data could get into the wrong hands when they’re taken outside the office. Moore explains that businesses can ensure that the data stored on mobile devices is secure when offsite through the use of full-disk encryption. “This must be enforced as mandatory for any device which leaves the building,” he says.

During the pandemic, many smartphones may have become compromised with serious cyber security vulnerabilities and will likely pose a threat to corporate networks as offices reopen. “The use of mobile app management can help network admins to be aware of what exactly is running on their network and take advantage of being able to control mobile devices remotely,” adds Moore.

BYOD fundamentals 

Modern businesses should already be aware of the cyber security challenges of employees using their own mobile devices on corporate networks because these issues existed long before the pandemic, according to Immersive Labs application security lead Sean Wright. “This risk should already be covered by a security policy and enforced by appropriate device management solutions,” he says.

But Wright believes that the return of employees to office-based working will likely test this to some degree, with more people resulting in a greater number of risk points. He says one of the best ways to resolve this problem is by setting tight user permissions.

Enterprises that allow employees to use their own mobile devices on corporate networks should stress the importance of implementing security patches. “The really important factor here is patching,” says Wright. “With consumer devices increasingly vulnerable, the devices connecting to your network should be up to date.”

Another vital consideration for businesses with bring-your-own-device (BYOD) initiatives is to ensure personal mobile devices operate on an isolated network, says Wright, adding: “The first thing an attacker will look to do is move laterally. This will deny them that opportunity.”

Andrew Hewitt, a senior analyst at Forrester, believes that the use of mobile devices on corporate Wi-Fi networks can be hazardous for organisations without a combination of device compliance, up-to-date certifications and identity and access management (IAM) capabilities. “However, with a strong foundation of unified endpoint management and IAM, this is not likely to be a major issue,” he says.

He also urges businesses and professionals to be wary of SMS-based phishing attacks, which have risen exponentially in the pandemic. “You could imagine a hacker sending out what seems to be an emergency notification from an office building when in reality it’s a phishing attempt,” says Hewitt. 

An influx of malware

Many businesses have allowed their employees to work on personal mobile devices over the past 18 months. But because consumer devices are typically less secure than corporate devices, they could have picked up all sorts of malware during this time and subsequently pose a danger to corporate security networks as offices reopen.

Martin Riley, director of managed security services at Bridewell Consulting, says: “As employees return to the office, there’s a risk they could be bringing compromised or less secure devices back on to the network, whether through the introduction of malicious apps or malware-infected devices. 

Related posts

Ban predictive policing systems in EU AI Act, says civil society

Insights on Nordic artificial intelligence strategies

January 14, 2023
Unionised contract workers who train Google’s AI win pay rise

Unionised contract workers who train Google’s AI win pay rise

January 14, 2023

“A lot of organisations are also overconfident in their current mobile device management and security capabilities. This is especially true if the organisation does not have a mature and integrated end user device management capability to underpin enterprise mobility technologies.”

Riley says the biggest challenge that IT teams will likely face when dealing with these issues is to get the balance right. For example, enforcing lots of cyber security restrictions on mobile devices could potentially affect productivity and user experience. But on the other hand, a relaxed approach may leave businesses vulnerable to serious cyber security threats. 

It’s vital that security responsibilities are not left in the hands of the users alone. Users need ongoing education
Martin Riley, Bridewell Consulting

He believes that the right answer is to enforce a zero-trust security model so that no individual or device is trusted. “This means separating users and devices as much as is reasonable for your business from corporate assets such as data, applications, infrastructure, and networks and following the Identify, Authenticate, Authorise and Audit model [IAAM],” says Riley. 

With new online threats constantly emerging, there’s also an onus on organisations to provide their employees with security awareness training. Riley says: “It’s also vital that security responsibilities are not left in the hands of the users alone. Users need ongoing education on the risks, types of threats and best practices.”

Because employees are increasingly relying on mobile devices and applications for work purposes, Riley urges organisations to include these within the scope of security controls, testing initiatives and anti-phishing technologies.

He adds: “By ensuring the use of a modern mobile endpoint and application management suite, organisations can enforce corporate policies on authentication, data management and patching, providing flexibility for the end user while improving risk management for the business.”

Taking immediate action

In the future, Capgemini cyber security director Lee Newcombe envisages organisations being able to connect “dirty devices” to corporate LANs with lower risk. But he says this currently isn’t possible due to the legacy model of flat and relatively unprotected internal networks.

“We are not yet living in the nirvana of a zero-trust world, with internal microsegmentation and every access request being subjected to a variety of security checks prior to being granted,” he says.

As a result, businesses need to take extra precautions when personal mobile devices are being used on corporate networks. First, Newcombe recommends that businesses ask their employees to ensure anti-malware signatures are up-to-date and delete any non-standard software before entering the office.

Newcombe also encourages businesses to conduct device posture checks remotely and on connection to the local network if they have the capabilities. Another important step is to use security monitoring solutions for identifying malicious activities within the internal network. And firms shouldn’t neglect server-side anti-malware solutions by focusing their attention on other areas. 

Although lots of businesses are reopening their offices with the easing of lockdown restrictions, the general consensus is that hybrid approaches will define the future of working. And as employees continue to use mobile devices at home and in the office, organisations must strengthen their cyber defences accordingly.

Jitender Arora, chief information security officer at Deloitte UK, encourages businesses to adopt strong phishing defences, endpoint detection and response systems, essential security services and web proxies in a bid to improve the security of their hybrid working environments.

For some people, returning to the office may be an exciting prospect after nearly two years of remote working – it’s iron-clad proof that the troubles of the pandemic are beginning to fade away and that better things are around the corner. 

But what many people don’t realise is that their mobile devices may be potentially unsafe and, when connected to office networks, could possibly harm their employer’s IT infrastructure.

As a result, workers must ensure their devices are fully up-to-date and secure. And businesses must strengthen their network security so that insecure mobile devices don’t provide cyber criminals with a point of entry into corporate systems.



Source link

Tags: mobilerisksUsers
Previous Post

Xbox Still Won’t Adopt VR as Phil Spencer Applauds Sony, Oculus & Valve’s Work

Next Post

5 Strength Moves to Get Your Cycling Body Ready

Next Post
5 Strength Moves to Get Your Cycling Body Ready

5 Strength Moves to Get Your Cycling Body Ready

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

CHANEL Chance Eau Tendre Scented Bath Tablets

CHANEL Chance Eau Tendre Scented Bath Tablets

12 months ago
10 Best Portable DVD Players for 2022

10 Best Portable DVD Players for 2022

1 year ago
Rhianon Lovelace Sets U64 Atlas Stone World Record of 146.8 Kilograms (324 Pounds)

Rhianon Lovelace Sets U64 Atlas Stone World Record of 146.8 Kilograms (324 Pounds)

3 months ago
Deck of Scarlet Solid Lip Oil New Shades

Deck of Scarlet Solid Lip Oil New Shades

12 months ago

BROWSE BY CATEGORIES

  • Beauty
  • Equipment
  • Health & Fitness
  • Lifestyle
  • Tech News
  • Virtual reality

BROWSE BY TOPICS

Beauty Equipment Health & Fitness Lifestyle Tech News Virtual reality

POPULAR NEWS

  • The 20 Best Leg Exercises for Size and Strength

    The 20 Best Leg Exercises for Size and Strength

    0 shares
    Share 0 Tweet 0
  • Who Is Dalton Gomez – Meet Ariana Grande’s Husband

    0 shares
    Share 0 Tweet 0
  • 14 Best Sanitary Napkins To Provide Comfort During Periods

    0 shares
    Share 0 Tweet 0
  • 10 Best CD Players in 2021

    0 shares
    Share 0 Tweet 0
  • Why Power Dressing is Important at Workplace For Women

    0 shares
    Share 0 Tweet 0
News 21 AV

We bring you the best of latest news articles with an emphasis. We offers an original take on the latest in Lifestyle, fashion, high tech and health & fitness informations and guides.

Follow us on social media:

Recent News

  • Anxiety, Your Brain, and Long COVID: What the Research Says
  • Black and Gray Decor Spiced With Hot Red Accents & Lush Terrariums
  • Blessing Awodibu Set to Compete in 2023 Chicago Pro 

Category

  • Beauty
  • Equipment
  • Health & Fitness
  • Lifestyle
  • Tech News
  • Virtual reality

Recent News

2023 CrossFit North America West Semifinal Results — Alex Gazan, Patrick Vellner Notch Wins

2023 CrossFit North America West Semifinal Results — Alex Gazan, Patrick Vellner Notch Wins

May 31, 2023
An Exercise in Repurposing and Design

An Exercise in Repurposing and Design

May 31, 2023
  • Blog
  • Privacy Policy
  • Disclaimer
  • Terms and Conditions
  • Contact us

© 2021 News.21av - Popular News & magazine powred by Get solutions.

No Result
View All Result
  • Home
  • Tech News
  • Virtual reality
  • Lifestyle
  • Beauty
  • Health & Fitness
  • Equipment

© 2021 News.21av - Popular News & magazine powred by Get solutions.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In