APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Disaster Recovery
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    3 Phases of Disaster Recovery

    Jerome Oglesby, Deputy CIO -Technology, Deloitte

    The Basics of Business Continuity and Disaster Recovery Planning: Can Your Business Survive When Disaster Strikes

    Tammy Moskites, CIO/CISO, Venafi

    Enterprise Resilience: The Key to Survival in a Time of Technological Upheaval

    Marin Ivezic, Enterprise Resilience and Cyber Security partner, PwC

    Disaster Management through Educational Research

    Dr. Djuwari, Director of Language Laboratory, STIE Perbanas Surabaya, Indonesia

    Building a Highly Effective Plan for Business Continuity when Disaster Strikes

    Benny Lee, Regional Director, Greater China, CenturyLink

    Business Continuity in the Age of Ever Evolving Ransomware

    Andrew Martin, Director APAC & Japan, Zerto

    How do you get your Organisation to be DR (Disaster Recovery) - Ready ?

    Nathan Steiner, Head of Systems Engineering ANZ, Veeam Software

    Top Three Disaster Recovery Planning Tips for Business Continuity

    Clement Goh, Managing Director, South Asia (ASEAN & India),

    right

    Mobile Security is not in a Complacent State

    Jonathan Andresen, Senior Director, Products & Marketing, Asia-Pacific & Japan, MobileIron

    Tweet
    content-image

    Jonathan Andresen, Senior Director, Products & Marketing, Asia-Pacific & Japan, MobileIron

    It’s not just new types of mobile attacks that are emerging every day, such as the recent Pegasus iOS zero-day exploit, but the velocity of attacks is also increasing. Even though most attacks re-use old tactics against mobile-specific services rather than employing new innovative techniques to exploiting new vulnerabilities, enterprises are still caught off guard.

    At the recent Black Hat USA 2016, the second edition of ‘Mobile Security and Risk Review’ published by MobileIron unearthed some alarming truths in the enterprise industry. Less than 5% of the companies surveyed use App Reputation or Mobile Threat Detection software, and only 8% are enforcing OS updates. In other words, most of the devices used for work are vulnerable, if not compromised.

    “ Enterprise Mobility Management (EMM) has come a long way in a short amount of time and is now simpler than ever to implement ”

    Of course, there are understandable challenges with the adoption of mobility. It includes balancing with the users’ desire to access easy-to-use consumer apps along with the need to control access to corporate data. And so enterprises simply block the riskier applications, such as Evernote and Line, both of which joined the top 10 most blacklisted consumer apps by corporate IT departments.

    Regulated industries and governments face even more challenges. Stringent security requirements make it hard for them to keep up with the dizzying pace of mobile technologies.

    Extended and more rigorous approval and procurement processes leave government organisations with older technology which in turn leaves them with more non-compliant devices, missing devices and EMMsoftware, and out-of-date policies that don’t match user requirements. Let’s face it: users are already Mobile First, while most IT departments still think of mobility as a secondary priority to their PC strategy.

    These are the mobile attacks that have either emerged or worsened in the last six months:

    • Pegasus: a serious and sophisticated new type of attack that leverages three vulnerabilities in iOS software, known as Trident, to allow cybercriminals to install spyware on your device.
    • Android GMBot:  Spyware that remotely controls infected devices in order to trick victims into providing their bank credentials. 
    • AceDeceiver iOS malware:  Designed to steal a person’s Apple ID.  
    • SideStepper iOS “vulnerability” :  Was discovered to intercept and manipulate traffic between an MDM server and a managed device.
    • High-severity OpenSSL issues:  Vulnerabilities that can potentially impact large numbers of applications and services, which could ultimately jeopardize enterprise data-in-motion.
    • Marcher Android malware: Evolved to mimic bank web pages that trick users into entering their login information through e-commerce web sites. 

    Security incidents are often the precursor to a breach because they leave a device or app vulnerable and then put enterprise data at risk.

    In general, enterprises have not yet significantly changed their mobile security practices in the face of these new threats to their corporate data. Aside from not enforcing updates or deploying the right software, there was also an increase in the number of employee compliance incidents. Forty percent of companies had missing devices, up from 33% in Q4 2015. And more than 25% of companies had out-of-date policies, an increase of 20% since last year. Such incidents are typically a precursor to an actual security breach.

    While embracing mobility appears tough, it’s actually quite simple with the right combination of technology and user education. By staying engaged with app trends, Enterprises can possibly have our cake and eat it too. The existence of enterprise versions of apps like Box, Dropbox and Evernote can give employees the Enterprise features and the experience they want while staying secure, as long as there is a layer of trust and security at the device, application and user level, a win-win for both sides.

    There’s little reason in today’s climate to ignore mobile security. Enterprise Mobility Management (EMM) has come a long way in a short amount of time, and is now simpler than ever to implement. EMM solutions are readily available to provide enterprises with the fundamental tools to mitigate these risks while empowering an increasingly mobile workforce. You can have it all – rigorous data protection, increased productivity and business outcomes, and happy employees too. Can you imagine that?

    tag

    enterprise mobility

    Weekly Brief

    loading
    25 Most Promising Disaster Recovery Solution Providers
    ON THE DECK

    Disaster Recovery 2016

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://disaster-recovery.apacciooutlook.com/views/mobile-security-is-not-in-a-complacent-state-nwid-3312.html