Mobile Device Security
Working from anywhere, and any device, securely
With the boom in remote and flexible working over the last decade many organisations have embraced mobile devices with open arms. As a result, many internal IT teams forfeited sovereignty over these devices, which reach deep into corporate servers and sensitive databases.
Opportunity vs risk
Mobile devices can reach as deep into corporate servers and databases as our traditional corporate devices can. Typically, corporate mobile devices are not secured as tightly as corporate laptops.
Mobiles may not be patched as regularly, downloads of data and applications are usually not as stringently monitored. Users are more likely to link their devices to public wifi hotspots and browser usage is unlikely to be locked down, offering a host of opportunity for anyone with malicious intent.
Mobile devices also come with a range of mobile specific threats. For example, phishing is no longer reserved for email. Increasingly we see mobile device phishing on messenger apps, SMS and social media - persuading users to click malicious links and download dodgy apps or attachments to their mobile phone.
User Privacy, company security
Privacy can also be an issue, especially in a bring your own device (BYOD) scenario, BlueFort works with mobile device management vendors who create a ring-fenced area on the device which the company can then control, and which is separate from the rest of the phone data or apps. This preserves privacy for the user and security for the organisation.
BlueFort works closely with specialist mobile security vendors such as Wandera and MobileIron. We also regularly work mobile device security into larger transformation projects where the solutions compliment mobile security well such as RSA and F5 are more appropriate. We understand that every business has different challenges, priorities and configurations, there is no ‘one-size-fits-all’ and we work with our clients to ensure they have a mobile device management solution that suits their requirements.