The world of mobile enterprise app security continues to be rather frightening. A study from Ponemon Institute says only 19 percent of IT departments have checked mobile apps brought into the enterprise through Bring Your Own Device (BYOD) work structures. And only 22 percent of IT departments realize that scanning is important.
Subbu Sthanu, director of Mobile Security and Application Security at IBM, suggests that using best practices in order to create secure apps is important, and that code from third parties be scrutinized. He says:
"The security of the mobile device itself is important. Jailbroken or rooted devices are vulnerable. It is important to install remote wiping capabilities. Finally, context and risk factor analysis is an important way to protect the organization when a mobile app is attempting to connect to backend services and databases."
Your company's data — client information, payment information, personal files, bank account details — is always at risk of falling into the wrong hands. And every day, security threats seem to come from a new place.
In this slideshow, we have collected some of the best advice that leading security experts have shared with IT Business Edge recently, identifying areas of data vulnerability and helping you develop strategies for securing your data and information systems.
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ... More >>