September 1, 2015 By Kevin Beaver 2 min read

Through direct conversations with business managers and end users, as well as stories from my colleagues in IT, I’ve heard one phrase a thousand times: “I don’t have anything of value on my smartphone.” It’s the main reason (see: excuse) that people don’t put passwords on their mobile devices. Yet I’m convinced it’s a fundamental way of thinking that’s leading to many of the data breaches we hear about.

Smartphone Security Matters

The downplaying of smartphone security risks seems justified. After all, in many cases, they’re seen as mere communication devices rather than computing devices. It can be argued that a good portion of people aren’t even aware of the technology at their disposal, let alone the information being stored that’s facilitating unnecessary risks with smartphones.

The average smartphone today has gigabytes worth of storage potential, often with the option to add more. Virtual private network (VPN) connections are made with these devices. Corporate emails are accessed. Sensitive files are loaded, stored and shared. Mobile apps are downloaded and used as needed.

Imagine the possibilities for data breaches when devices are lost or stolen, used on unsecured wireless connections and even infected with malware. The typical smartphone is just about as powerful as — and has as much or more utility than — modern laptop computers, yet we’re still treating them as novelty items.

Executives Must Take the Lead

The phenomenon of “I don’t have anything of value” comes from all employees, but it’s executives that seem to say it the most. Ironically, these are the people whose phones — and the information stored on them — are at the greatest risk!

Just recently, I heard a C-level executive say, “The phones belong to our users, so there’s nothing we can do about them.” I’ve heard this many times before. It’s as if many business leaders have given in to the perceived reality that users call the shots. Or, just as badly, they view it as something that IT is handling and they leave it at that.

Smartphone vulnerabilities are not just a technical problem for IT or security teams to fix. This is a business risk that needs to be addressed — and enforced — at the highest levels of the organization. Acknowledge the security challenges these seemingly innocuous devices are creating. More importantly, vow to address the issue and then make sure it happens. Be it passwords, a full-blown mobile device management (MDM) system or ongoing assessments, do something about the security of your smartphones before they end up making you look dumb.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today