August 3, 2015 By Jason Hardy 2 min read

When you think about mobile security and bring-your-own-device (BYOD) policies, do you ever think about all the places your enterprise data is going? This time of year, many of us reward ourselves for all of our hard work with a well-deserved vacation. It’s time to get away from it all and relax! But in this mobile world we live in, “getting away from it all” has taken on new meaning. Now it is probably more accurate to say “getting away and taking it all with me.”

That might sound strange, but with the prevalence of smartphones and other mobile devices — not to mention the way BYOD is integrated into our personal and professional lives — we truly take it all with us to the beach and everywhere else.

The Need for Mobile Security

I just returned from my vacation, and each day, my family and I would pack a bag that we would carry back and forth between our condo, the pool and the beach. We packed everything you would expect: towels, sunscreen, swim goggles, speakers and a smartphone for each family member. Like any good security-minded professional, I warned my family not to leave the bag unattended. In other words, protect the devices!

In 2014, “The State of Mobile Security Maturity” study found the top mobile security concern among those interviewed was the potential for data leakage as a result of lost, stolen or compromised devices. Companies made it clear that their focus is on protecting the device — and with good reason. Smartphones literally go everywhere with us. Their portability makes them prime candidates for being lost or stolen.

In the past, I took my laptop on vacation with me, but corporate data was left behind. It stayed in the condo, locked inside where it was nice and secure. But with mobility and BYOD, however, all that data truly goes on vacation with me now. It went to the pool and the beach, ventured out to eat, played a few rounds of golf and visited all the local attractions. It was in my pocket, on the table, in my bag, in the golf cart, in the boat and in a number of locations where it could have been lost or stolen.

This is the new world for corporate data. Thanks to BYOD, it goes everywhere.

As Mobile Grows, So Do Security Threats

Cybercriminals and thieves are an industrious and opportunistic bunch. They recognize the growth in mobile and the opportunity it creates for them. As a matter of fact, the recent white paper titled “Mobile: The New Hackers’ Playground,” digs into this topic. With BYOD, attackers have literally been given millions of new entrance points to the enterprise. Their challenge is in determining which ones to exploit. Who do they target and how?

They frequently execute attacks by looking for a weak link through phishing and spear phishing activities, often succeeding and then laying in wait for the right opportunity to exploit their victim. This video offers a quick explanation of how this concept works in the real world.

While BYOD brings device protection to the forefront, there are other threats that need to be addressed, as well. A comprehensive mobile security strategy doesn’t stop at securing physical devices, after all — it also addresses securing content and collaboration, safeguarding applications and data and managing user access.

As you ponder where you are taking your corporate data, or maybe where others are taking it, think about what you are doing to make sure it stays safe.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today