INTERACTIVE SESSION: TECHNOLOGY BYOD: A Security Nightmare? share files. There are also many instances where employees are using Dropbox to store and exchange files without their employers' approval....


What management, organizational, and technology issues must be addressed by smartphone security?


INTERACTIVE SESSION: TECHNOLOGY<br>BYOD: A Security Nightmare?<br>share files. There are also many instances where<br>employees are using Dropbox to store and exchange<br>files without their employers' approval. In early 2015<br>Dropbox had to patch a security flaw that allowed<br>cyberattackers to steal new information uploaded<br>to accounts through compromised third-party apps<br>that work with Dropbox services on Android devices.<br>There's very little a company can do to prevent<br>employees who are allowed to use their smartphones<br>from downloading corporate data so they can work<br>on those data remotely.<br>Text messaging and other mobile messaging tech-<br>nologies are being used to deliver all kinds of scam<br>campaigns, such as adult content and rogue phar-<br>macy, phishing, and banking scams, and text mes-<br>sages have been a propagation medium for Trojan<br>Bring your own device has become a huge trend,<br>with half of employees with mobile computing tools<br>at workplaces worldwide using their own devices.<br>This figure is expected to increase even more in the<br>years to come. But while use of the iPhone, iPad, and<br>other mobile computing devices in the workplace<br>is growing, so are security problems. Quite a few<br>security experts believe that smartphones and other<br>mobile devices now pose one of the most serious<br>security threats for organizations today.<br>Whether mobile devices are company-assigned or<br>employee-owned, they are opening up new avenues<br>for accessing corporate data that need to be closely<br>monitored and protected. Sensitive data on mobile<br>devices travel, both physically and electronically,<br>from the office to home and possibly other off-site<br>locations. According to a February 2016 Ponemon<br>Institute study of 588 U.S. IT and security profession-<br>als, 67 percent of those surveyed reported that it was<br>certain or likely that an employee's mobile access<br>to confidential corporate data had resulted in a data<br>breach. Unfortunately, only 41 percent of respon-<br>dents said their companies had policies for accessing<br>corporate data from mobile devices.<br>More than half of security breaches occur when<br>devices are lost or stolen. That puts all of the per-<br>sonal and corporate data stored on the device, as well<br>as access to corporate data on remote servers, at risk.<br>Physical access to mobile devices may be a greater<br>threat than hacking into a network because less<br>effort is required to gain entry. Experienced attack-<br>ers can easily circumvent passwords or locks on<br>mobile devices or access encrypted data. Moreover,<br>many smartphone users leave their phones totally<br>unprotected to begin with or fail to keep the security<br>features of their devices up-to-date. In the Websense<br>and the Ponemon Institute's Global Study on Mobil-<br>ity Risks, 59 percent of respondents reported that<br>employees circumvented or disabled security fea-<br>tures such as passwords and key locks.<br>Another worry today is large-scale data leakage<br>caused by use of cloud computing services. Employ-<br>ees are increasingly using public cloud services such<br>as Google Drive or Dropbox for file sharing and col-<br>laboration. Valiant Entertainment, Cenoric Projects,<br>horses and worms. A malicious source is now able<br>to send a text message that will open in a mobile<br>browser by default, which can be readily utilized to<br>exploit the recipient.<br>To date, deliberate hacker attacks on mobile<br>devices have been limited in scope and impact,<br>but this situation is worsening. Android is now the<br>world's most popular operating system for mobile<br>devices with 81 percent of the global market, and<br>most mobile malware is targeted at the Android plat-<br>form. When corporate and personal data are stored<br>on the same device, mobile malware unknowingly<br>installed by the user could find its way onto the cor-<br>porate network.<br>Apple uses a closed

Extracted text: INTERACTIVE SESSION: TECHNOLOGY BYOD: A Security Nightmare? share files. There are also many instances where employees are using Dropbox to store and exchange files without their employers' approval. In early 2015 Dropbox had to patch a security flaw that allowed cyberattackers to steal new information uploaded to accounts through compromised third-party apps that work with Dropbox services on Android devices. There's very little a company can do to prevent employees who are allowed to use their smartphones from downloading corporate data so they can work on those data remotely. Text messaging and other mobile messaging tech- nologies are being used to deliver all kinds of scam campaigns, such as adult content and rogue phar- macy, phishing, and banking scams, and text mes- sages have been a propagation medium for Trojan Bring your own device has become a huge trend, with half of employees with mobile computing tools at workplaces worldwide using their own devices. This figure is expected to increase even more in the years to come. But while use of the iPhone, iPad, and other mobile computing devices in the workplace is growing, so are security problems. Quite a few security experts believe that smartphones and other mobile devices now pose one of the most serious security threats for organizations today. Whether mobile devices are company-assigned or employee-owned, they are opening up new avenues for accessing corporate data that need to be closely monitored and protected. Sensitive data on mobile devices travel, both physically and electronically, from the office to home and possibly other off-site locations. According to a February 2016 Ponemon Institute study of 588 U.S. IT and security profession- als, 67 percent of those surveyed reported that it was certain or likely that an employee's mobile access to confidential corporate data had resulted in a data breach. Unfortunately, only 41 percent of respon- dents said their companies had policies for accessing corporate data from mobile devices. More than half of security breaches occur when devices are lost or stolen. That puts all of the per- sonal and corporate data stored on the device, as well as access to corporate data on remote servers, at risk. Physical access to mobile devices may be a greater threat than hacking into a network because less effort is required to gain entry. Experienced attack- ers can easily circumvent passwords or locks on mobile devices or access encrypted data. Moreover, many smartphone users leave their phones totally unprotected to begin with or fail to keep the security features of their devices up-to-date. In the Websense and the Ponemon Institute's Global Study on Mobil- ity Risks, 59 percent of respondents reported that employees circumvented or disabled security fea- tures such as passwords and key locks. Another worry today is large-scale data leakage caused by use of cloud computing services. Employ- ees are increasingly using public cloud services such as Google Drive or Dropbox for file sharing and col- laboration. Valiant Entertainment, Cenoric Projects, horses and worms. A malicious source is now able to send a text message that will open in a mobile browser by default, which can be readily utilized to exploit the recipient. To date, deliberate hacker attacks on mobile devices have been limited in scope and impact, but this situation is worsening. Android is now the world's most popular operating system for mobile devices with 81 percent of the global market, and most mobile malware is targeted at the Android plat- form. When corporate and personal data are stored on the same device, mobile malware unknowingly installed by the user could find its way onto the cor- porate network. Apple uses a closed "walled garden" model for managing its apps and reviews each one before releasing it on its App Store. Android applica- tion security has been weaker than that for Apple devices, but it is improving. Android application security uses sandboxing, which confines apps, mini- mizing their ability to affect one another or manipu- late device features without user permission. Google removes any apps that break its rules against mali- cious activity from Google Play, its digital distribu- tion platform that serves as the official app store for the Android operating system. Google also vets the backgrounds of developers. Recent Android security enhancements include assigning varying levels of trust to each app, dictating what kind of data an app can access inside its confined domain, and providing a more robust way to store cryptographic credentials Vita Coco, and BCBGMAXAZRIAGROUP are among the companies allowing employees and freelance contractors to use Dropbox for Business to post and used to access sensitive information and resources.
Jun 03, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here