Editorial: Making mobile workers secure

The biggest mobility story in Australia this year was arguably the launch of Apple’s iPhone 3G locally. This device has been labelled the “Jesus phone” and it’s not hard to see why – its combination of mobile telephony, Internet capability, ease-of-use and trendy Apple design have won over all types of users.

But rapid take-up of this device, along with the clones that will follow it, is fraught with challenges: Most notably, securing them. As users start to adopt more Internet-enabled devices like iPhones, Blackberrys and ultramobile PCs, and begin using them for work-related purposes and corporate applications, they’re also introducing a whole new batch of security challenges for administrators.

ARN’s Security Guide takes an in-depth look at the top 7 mobile security threats facing users and organisations today from the proliferation of mobile Internet devices, or MIDs. The list includes plenty of the more traditional security nasties affecting wired networks and attached clients that we’ve learnt to despise: Viruses, malware, spyware and other Web exploits.

There’s also some new stuff thrown that your customers may not have extended their thinking to yet, such as legal discovery and reporting requirements, snoopware, device theft and reputation damage.

As most mobile workers will need to connect to the corporate network at some time, there is also a need for organisations to ensure network intrusion prevention technologies extend right to the perimeter.

Bu t regardless of the type of threat, all vendors stress the need for urgency in security practices and processes. As the amount of threats grow exponentially, and as more mobile clients are brought into the network, channel partners need to be vigilant in ensuring customers keep their security policies up to date and avoid being vulnerable in future.

As well as a look from above, we’ve included a case study of one South Australian organisation looking to go mobile but battling with bandwidth limitations from too much spam. By cutting the number of dodgy emails getting through the gateway, Zoos SA was able to dedicate more time to developing mobility tools allowing staff to manage information while on the go.

Readers will also find security software and hardware products from a raft of vendors in the latter part of the guide.

Comments

Comments are now closed

 
Computerworld
CIO
Techworld
CMO

Latest News

03:09PM
CoinJar’s bitcoin EFTPOS card to hit the market next week
02:52PM
Queensland Government appoints Interactive Intelligence to ICT Service Panel
02:19PM
More than 200 Aussie Apple fanatics hire minions to stand in line for iPhone 6
12:59PM
Former Microsoft exec named CEO of Australian bar tab start-up
More News
29 Sep
Vendor and Supplier Management Workshop
30 Oct
Ovum 2020 Telecoms Summit
05 Nov
vForum 2014
25 Nov
GovInnovate Summit
View all events