SMBs warned that mobile security remains a problem
With the rise of malware attacks, mobile security remains a major point of concern for small businesses. According to a recent survey, the number of bring-your-own-device (BYOD) threats continues to rise, which emphasizes the importance of security measures that employees should practice to protect company data.
The survey, conducted by Osterman Research for Trend Micro, found that smartphones, tablets and laptops are becoming common tools to conduct business among SMBs. As a result, cybercriminals are attempting to infect a large number of devices to gain access to company information.
The report also showed that between 2007 and 2012 there has been a 35 percent increase in the number of reported website violations, and a 12 percent increase in the number of email violations.
Many small organizations are using an Android devices, according to the survey. In the past year, the number of Androids used among business employees for work purposes has increased 7.1 percent. However, after performing a scan using a technology that detects device flaws, Duo Security found that Android products have become more vulnerable to security threats, and the number of malicious apps meant to gain access to personal information has increased, according to a Duo Security survey and reported by Tech World.
To protect data against cybercriminals, small businesses should implement the necessary security measures. Trend Micro suggests that companies update their system on a regular basis to ensure hackers can't access information. Passwords should also be used as a form of protection to prevent unauthorized users from looking at confidential data.
Mobile device management software could also be used to enforce security. According to a report by Gartner called Critical Capabilities for Mobile Device Management, as BYOD gains popularity among professionals, the MDM market is quickly rising, reported TechTarget. By giving IT departments control across multiple platforms, company information can be monitored and erased, if necessary, to secure data, which is useful if a person loses his or her smartphone or tablet. If an organization decides to implement an MDM system, owners should conduct research to determine how each vendor approaches policy enforcement, security and document sharing.
The results of the Trend Micro and Duo Security surveys show that businesses are not prepared for possible threats against data security. IT departments should be ready for any scenario, including a mobile breach, which could affect the unified communications of a company.