Zurück zur Übersicht

Mobile working starts with the right mobile security design

A mobile working model inevitably requires corresponding procedures, behavior recommendations and security technology. Without these basic essentials, dangers lurk around every corner.

Mr. Jud, what does “mobile security” mean?
First and foremost, mobile security is the security of information on mobile devices. These devices need to be protected against all external and internal risk factors, while also being cost-effective and user-friendly. But it is also important to consider connection and back-end security. Only by looking at all these aspects is it possible to operate a secure mobile infrastructure.

What new challenges do companies face?
Nowadays, companies need to take an active approach to information protection and data security. In the mobile sector in particular, businesses are subject to attack on multiple fronts.  Today, a lot of business-critical data is already being stored on mobile devices. Without the right protective measures, these devices can easily be hacked. The General Data Protection Regulation, or GDPR, which came into effect on 25 May 2018, as well as the new Swiss Data Protection Act, which is due to come into effect at the end of the year, will make customer data protection even more compulsory for companies. Security by design is therefore a given.

Do companies recognize the importance of mobile security today? 
Companies are slowly starting to recognize its importance. Too slowly, in fact. After years of doing too little or nothing at all, IT personnel in many sectors are recognizing the growing dangers. A variety of tools on the market also make it easier for hackers to access unprotected corporate data.

Why is there a greater risk of attack on mobile devices than on PCs?
A PC or server is permanently installed within the company. It is usually protected by a building, firewalls, antivirus programs, etc. Mobile devices, on the other hand, are portable, which can easily lead to loss. They are connected to the Internet 24 hours a day, making them permanently accessible to potential hackers. Mobile threat solutions are still not very common, and there can be a wide variety of old and current data stored on mobile devices. For hackers, this is a money-making opportunity. Studies show that attacks on server systems and on networks are on the decline, but attacks on endpoints, including mobile devices, are increasing rapidly.

In your opinion, where is the market heading in the future?
I think mobile security will play an increasingly important role. The need is there, and more and more IT departments are recognizing this vulnerability within their organizations. However, I see the need for and understanding of mobile security as linked to the maturity of the company. Companies and employees will need to use much more flexible working models in the future. This makes having the right data, at the right time, in the right place all the more important. For companies, this in turn creates the challenge of ensuring optimal data protection, while also making data available to employees on a mobile basis. The subject of mobile security is very complex and sometimes underestimated, which can lead to high costs in times of crisis.

What should business owners consider when choosing their mobile security solution?
This depends on how exactly they handle their data. A good provider will provide a preliminary analysis, which is very valuable to companies. Without it, companies risk indiscriminately installing security solutions that might ultimately be incompatible. Companies should definitely rely on solutions that are known to successfully protect and provide the appropriate security certifications. The major security software vendors play a pioneering role in this. And last but not least, security is always a matter of keeping systems up to date. Companies should rely on a maintenance contract with automatic updates, as this offers optimal data protection against emerging dangers. No one would turn off a plane’s engines just because it’s in the air, right? We know from experience that in the absence of a good pre-analysis, things often have to be done twice, and in some cases even unnecessary things are implemented. This slows down the project and brings dissatisfaction.

These problems are why you developed the Security Workshop. What does it entail?
Our customers quickly receive an overview of the security options available as well as a customized implementation plan. This allows for the optimal implementation of mobile security in a sustainable, cost-efficient and, above all, secure way.

Do you want to know more?

Contact me now for an exchange. I look forward to meeting you!

Samuel Jud

Samuel Jud, Mobile Solution Architect & Consultant