Mobile Device Security in the Workplace
How secure is your mobile device?
Picture Retrieved From: http://escapethewolf.com/2014/09/26/mobile-device-security-part-1/ |
Malware attacks are becoming more common as mobile devices continue to integrate their way into our daily lives. Malware attacks, or "Malvertising", are happening when a user downloads applications and a Trojan is released into the device allowing it to intercept data through either the mobile phone network or a WiFi signal. Android devices are more susceptible as they use an open operating system where virtually anyone can design an app, or perhaps a Malware Trojan disguised as an app. These attacks can also take place through cell phone providers SMS and MMS as they act as a gateway for interception.
As devices progress into smaller and more lightweight objects for ease of access, they are also becoming easier to steal. Many users may think that having a password will protect them for most vulnerabilities, but as technology develops it becomes a lot more complex than just needing a password. Most devices also now use a "Cloud" service which wirelessly transfers data from your device to an online backup. This technology can be very useful in the event a device gets lost, broken, or stolen, but it also makes the data on the device a lot easier to intercept.
This poses a threat, not only to someone's personal information, but also to the confidential property and knowledge of businesses.
Insider threats from mobile use
Threats are not always from an external source, there can sometimes be insider threats within a business as well. An employee with a mobile device from the company can download mass amounts of confidential information and disrupt internal communications. Although most companies tend to have a Data Loss Prevention system in place, it too could also be corrupted.
These threats could be either intentional, or completely unintentional. Unintentional threats could result from the user being uneducated about the developer of an application they have downloaded onto an information sensitive device. They could also be communicating with people they believe to be business contacts, but in fact are hackers trying to obtain sensitive information. With the development of technology in the workplace, most people are unaware of how their devices actually work and assume they are automatically secured.
Picture Retrieved From: https://www.esoftload.info/wp-content/uploads/2014/05/monitoring-workplace.jpg |
IM & Internet Monitoring in the Business World
- Nearly two thirds of companies monitor employee communications and internet browsing.
- Companies are not legally required to inform employees that they are monitoring them.
- Businesses rarely state an exact list of what is considered to be an acceptable website.
- All messages are monitored as long as company equipment and/or company email is being used, regardless if you are using your personal email on the company networks.
- Companies do monitor outside IM services, such as face-time, as the threat posed by the services continues to surface.
- Working from home is no exception to monitoring if you are connecting to company networks or using company computers. Your personal files on the computer are monitored and scanned by the company as well.
- Companies can find deleted browser history items and monitor how you are using their systems regardless of whether you think you have deleted the evidence or not.
- Employers must follow the law when it comes to personal privacy, but only to a certain degree.
- Companies can and do fire people for having bad internet habits.
What you can do after reading this entry!
- Think about how these concepts and facts apply in your daily personal and work life.
- Think about the equipment you use at work and how you could be being monitored.
- Ask your employer about how they monitor technology usage.
- Consider what you could do to prevent inappropriate use or infiltration of company information.
- Make sure to continue using IM and other forms of communication professionally!
Bibliography
Escape
the Wolf. (2014, September 26). Mobile Device Security. Retrieved
February 25, 2015, from Escape the Wolf:
http://escapethewolf.com/2014/09/26/mobile-device-security-part-1/
Grahn, D. P. (2014, November 12). Mobile Device Security
in the Workplace: 6 Key Risks & Challenges. Retrieved February 25,
2015, from Focus:
http://focus.forsythe.com/articles/55/Mobile-Device-Security-in-the-Workplace-6-Key-Risks-and-Challenges
Singh, A. (2014, May 27). Monitoring-Workplace.
Retrieved February 25, 2015, from SoftLoad:
https://www.esoftload.info/wp-content/uploads/2014/05/monitoring-workplace.jpg
Tynan, D. (2004, October 6). Your Boss
Is Watching. Retrieved February 25, 2015, from PC World:
http://www.pcworld.com/article/118072/article.html