Securing mobile devices for a remote workforce

Issue 3 2022 Cyber Security

The work-from-anywhere (WFA) model has greatly expanded in South Africa as loadshedding forces remote workers to seek power from a multitude of sources, such as malls and coffee shops. This means they may be alternating between mobile phones, tablets and laptops across any number of potentially unsecured public Wi-Fi hotspots. This mobility increases the cybersecurity risks presented by all these devices that are often poorly secured to begin with.


Doros Hadjizenonos.

Smartphones have become a critical part of the remote workforce toolkit. They are such an integral part of each person’s daily routine; people may regard them as trusted and safe. As a channel to your personal data, banking and accounts, and a link to your work and business data, smartphones drive cybercriminals directly to your pocket. As such, they may become the next big vector to hijack and weaponise in distributing attacks.

Mobile cybersecurity threats mostly align with the common threats, including phishing and malware, but they can also include mobile-specific issues such as application-based threats and device and OS-based exploits. Verizon’s Mobile Security Index 2021 found that while 71% of enterprises see mobile devices as critical to their business, 40% also see them as their company’s biggest security risk and 53% said the consequences they faced as a result of a mobile device-related security compromise were major. Moreover, the survey found that 93% of Android devices were running an out-of-date version of the OS, and 49% of workers allowed their family or friends to use their work devices.

Securing mobile devices

As an endpoint in the corporate network, the mobile device needs to be secured with strong PINs, passwords and even biometric logins such as facial recognition and fingerprint scanners. Multi-factor authentication is an authentication method that protects individuals and organisations by requiring users to provide two or more authentication factors to access an application, account, or virtual private network (VPN). This adds extra layers of security to combat more sophisticated cyberattacks, even after credentials or identities have been stolen, exposed, or sold by third parties.

As a key part of the WFA strategy, mobile devices also need to be protected within a Zero Trust model, which stipulates that trust should be explicitly derived from a mix of identity and context-based aspects. Further, zero trust network access (ZTNA) provides per-user access to specific applications, far surpassing implicit trust when it comes to security. Every device, user and application can be seen and controlled regardless of where they are connecting from. Implementing a zero-trust model provided by ZTNA ensures that whenever a user or device requests access to a resource, they are verified before access is given.

By unifying Fortinet’s broad portfolio of zero trust, endpoint, and network security solutions within the Fortinet Security Fabric, Fortinet delivers security, services and threat intelligence that seamlessly follow users whether on the road, at home, or in the office to provide enterprise-grade protection and productivity.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Be aware of privacy and cybercrimes issues
Security Services & Risk Management Cyber Security Retail (Industry)
Artificial intelligence (AI) is being deployed to help shoppers make better choices, but retailers must be aware of their obligations under personal privacy and cybercrimes laws.

Read more...
Poor router security makes SMBs vulnerable to attack
Cyber Security
While major malware and ransomware incidents frequently make headlines in the media, router vulnerabilities are not as frequently publicised, but the outcomes of these violations could be immensely damaging.

Read more...
Cybercriminals eye South African SMEs lack of security
Cyber Security
Just as a business owner wouldn’t underinsure a tangible business asset such as a factory, SMEs shouldn’t leave their digital assets unlocked and in plain sight of criminals.

Read more...
Harnessing the power of AI-driven XDR
Cyber Security
According to AIMultiple, 90% of infosec personnel in the U.S. and Japan said they’re anticipating an increase in these automated attack campaigns, due in no small part to the public availability of AI research.

Read more...
Be prepared for the increase in reconnaissance
Cyber Security
Because ransomware has become so lucrative, cybercriminals are becoming more devious and putting significantly more energy into reconnaissance.

Read more...
Cybereason expands presence across sub-Saharan Africa
News Cyber Security
Cybereason has appointed Chantél Hamman as its new channel director focused on growing the company’s presence across sub-Saharan Africa.

Read more...
How to weather the approaching perfect storm
Cyber Security
Cybercrime is spiking and security skills are scarce, and small and medium enterprises (SMEs) are particularly vulnerable as the financial impact of falling victim to these security breaches can result in their total collapse.

Read more...
Cyber resilience is more than security
Industrial (Industry) Cyber Security IT infrastructure
Kate Mollett, regional director at Commvault Africa advises companies to guard against cyberattacks in the shipping and logistics sector using an effective recovery strategy.

Read more...
Preventing cyberattacks on critical infrastructure
Industrial (Industry) Cyber Security
Cyberattacks have the potential to disrupt our lives completely, and in instances where critical national infrastructure is attacked, they could disrupt the country’s entire economy, leading to loss of life and livelihoods.

Read more...
Cybersecure surveillance cameras
HiTek Security Distributors News CCTV, Surveillance & Remote Monitoring Cyber Security
Provision-ISR builds customer trust and opens up new opportunities with Check Point Quantum IoT Protect Firmware built into Provision-ISR cameras.

Read more...