“Human factor” is often cited as one of the weakest links in security. With the proliferation of mobile devices and the rise of a digital identity, users find it difficult to manage their passwords. As a consequence, many users resort to a simple but insecure practice of not using passwords or passcodes on their mobile devices.
Enforcing complex or frequently changing passwords exacerbates the issue. An optimal solution is always a compromise between usability, security, and cost.
It is imperative that proper risk management be applied, and security controls implemented, to maximize the benefits while minimizing the risks associated with such devices.
Use it; don’t lose it.
Losing your smartphone or tablet, or the information on it, can be a hassle. If you lose your mobile device, you not only have to replace it, but you could also lose the sensitive information you had stored on it, including account numbers and confidential work information. So, why do so many of us leave our mobile devices unprotected and not use mobile security?
Most of us now understand that we need to protect our computers from the myriad of threats that we see each day. But many of us don’t realize that we face the same threats, as well as a host of new ones, with our mobile devices.
Considering how much we rely on our mobile devices, and how much opportunity cybercriminals have to launch attacks against them, you’ll want to make sure you are protected.
Manage your risk exposure
As mobile technology companies continue to innovate over the coming years, organizations using these technologies will need to continuously assess the security implications of adopting these advancements. A consistent and agile multiperspective mobile security risk assessment will enable evaluation of the risk exposure in these systems.
Mobile devices have been, and continue to be, a source of security incidents. These stem from issues such as device loss, malware, and external breaches. As the availability of human resources and systems continue to be critical to society and business operations, it stands to reason that mobile device usage will continue to escalate, as will the features these devices offer, and the potential for compromised security.