© 2020 Content Security Pty Ltd.

Enterprise Managed services

Mobile Security

Gaining full visibility and control over mobile user activity across your organisation is crucial. As devices become more like computers the risks become even greater.

Improved capabilities of current mobile devices are converting them from portable email clients to viable desktop replacements and now viewed as the centrepiece of modern information knowledge work. In some cases, such as Windows 10 devices, there is virtually no difference between a tablet and a desktop, except the form factor.

Mobile, laptop, tablet, are all the same thing to a hacker

Unfortunately, hackers don’t care about the form factor: From their point of view, mobile devices are just an organisation’s desktop, but one that doesn’t have the extensive protection of a corporate perimeter. This makes them easy pickings to be hacked. With increasing numbers of people accessing and creating documents on the go through Office 365 and Google Apps, these devices now have an equal level of access to sensitive corporate information, and thus require equivalent protection.

This includes:

  • Anti-malware and/or application whitelisting: Not only are app stores not as safe as they purport, applications can be side-loaded, and vulnerabilities such as BlueBorne have demonstrated that arbitrary code can be introduced through remote code execution vulnerabilities.
  • Encryption of sensitive files: Even when users don’t use tablets and phones to store files, sensitive information can be insecurely cached from email, web and chat programs. Also users will often download a file for a review and forget that it is in their downloaded files folder. These can easily be used by criminals that either have remote or physical access to the mobile device.
  • Remote management capability: Originally known as mobile device management, the ability to push down software and enforce security policy (such as pin/password complexity) still remains as relevant today.

Mobile security management needs to treat all of your mobile devices in the same manner as non-mobile devices because they expose the same security risks – if not higher.

Why Content Security?

If you’re not sure whether your mobile strategy is having a negative impact on your security posture, contact Content Security for an obligation free chat, and review some of our strategies to help you go mobile more safely.

Our team are seasoned, experienced and business-minded security consultants with an average of 10 years experience across state and local government, health, finance, education, nonprofit organisations and more.

For more information please contact our cybersecurity professionals today.