Businesses face mobile security challenge in 2010

Businesses will start rolling out mobile anti-virus software over the next six to 12 months, but companies are generally ill-prepared for how mobiles will...

Businesses will start rolling out mobile anti-virus software over the next six to 12 months, but companies are generally ill-prepared for how mobiles will impact business security.

A study of more than 50 large and mid-sized companies by Acumin Consulting and security analyst Goode Intelligence found that businesses believe mobile security will become increasingly important.

The findings are mirrored by anti-virus security company Kaspersky, which has predicted that hackers will target the iPhone and Google Android phones in 2010.

Goode Intelligence said, "Apple's mobile App Store, distributed through iTunes, and Google's Android Marketplace are changing the face of the mobile phone industry, allowing users to benefit from increased mobility and convergence."

However, Goode Intelligence believes businesses have not fully considered the security impact of mobile technology on their businesses. The analyst noted that organisations were increasingly allowing employees to use smartphones in business, where the mobile phone operating systems supported downloadable applications and access GSM and Wi-Fi networks.

"To support these devices, organisations must have effective and relevant information security policy and procedures and adequate technology controls to manage them," Goode Intelligence said.

Read more on Mobile hardware

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close