Security Vulnerabilities at All-time Highs for Mobile Devices
Mobile security recommendations for consumers and administrators.
The proliferation of smartphones is changing IT's mandate right down to the roots. To a great extent, the devices in use are beyond the direct control of IT departments simply because employees are bringing them to work. That isn't always the case, however. IT departments in companies that still distribute devices to employees must choose which are to be used.
Choosing the right mobile device, of course, is a far more involved process than back in the day, or days: In the desktop and early smartphone eras Microsoft Windows and Research In Motion's BlackBerry, respectively, were the automatic choices.
There are no automatic choices today. Processor has a nice article outlining what IT departments and other planners should look for in a device. It's a tricky business, since the capabilities and limitations of the gadget the employee holds in his or her hand is only a portion of what is important in the choice - though the device itself is of course vital.
But, in more and more cases, the decision on which devices and networks will be used won't be entirely - or in some cases, even partially - up to the organization. Bring-your-own-device (BYOD) will drive a couple of trends that already are apparent.
At the highest level, Telecom Expense Management (TEM) focuses on helping businesses save money by finding the right wireless plan. To do this effectively, however, it quickly considers all the issues brought up in the Processor piece, and then some. TEMIA - the Telecom Expense Management Industry Association - is planning a meeting for early next month in Boston.
The reality is that organizations - especially small- and medium-size businesses - no longer can manage their wireless alone. There is a lot of money to be made in helping enterprises navigate the new reality of a heterogeneous smartphone environment. The uncertainty of what devices employees are using and the differences in how they operate (even if they are known) lead to a simple conclusion: The focal point of management and security must exit the device and enter the network.
Mobile device management and related products and services are emerging quickly. Computerworld reported last week on announcements along these lines by Verizon Wireless and AT&T. Sprint announced its own cross-carrier service last month. Other companies have entered the sector as well.