Mobile devices are potentially next on the hacker’s list – it’s time to act and secure the mobile devices!
Join us on June 6th to get back in control.
In too many cases IT is seen as the ‘guys who restrict everything’, and in a lot of those cases that’s true – for a reason.
If IT wants to avoid bad things from happening, such as the ones we’re experiencing with the global ransomware attack, they need to close as much doors as possible. But how many ‘doors’ are that and how can we continue to ‘work’ while all ‘doors’ are closed?
An interesting comparison everyone can make in its company is between the security rules and measures on mobile and on PC. Knowing that only a fraction of the mobile devices being used for work are actually managed in some form, the results should be staggering… Where most PC’s are managed in a company, the mobile devices are ‘less’.
At the same time we see global hacking campaigns targeting PC’s (including business PC’s) with ransomware.
The success on PC’s is due to two facts:
– it’s easy due to the architecture of the platform
– there are a lot of those around
We could say the same thing for mobile devices, but the first one is certainly NOT true.
On PC’s the restrictions imposed by IT are also experienced as very restrictive (a typical employee can not install a private application) but is not very secure. Content from ‘outside’ can still be downloaded and infect the entire system, because the platform is designed that way.
On mobile devices the restrictions imposed by IT only affect corporate apps and data, the employee is in full control over his device and can install any app he or she likes – without any impact on the security of the device or corporate information.
On June 6th we organized an event with subject matter experts to dive into security, the GDPR link with mobile, because it’s important, but also to illustrate it should not be the final goal – it’s only the beginning of a business transformation where the employee experience plays a central role.