Securing mobile devices for a remote workforce

Issue 3 2022 Cyber Security

The work-from-anywhere (WFA) model has greatly expanded in South Africa as loadshedding forces remote workers to seek power from a multitude of sources, such as malls and coffee shops. This means they may be alternating between mobile phones, tablets and laptops across any number of potentially unsecured public Wi-Fi hotspots. This mobility increases the cybersecurity risks presented by all these devices that are often poorly secured to begin with.


Doros Hadjizenonos.

Smartphones have become a critical part of the remote workforce toolkit. They are such an integral part of each person’s daily routine; people may regard them as trusted and safe. As a channel to your personal data, banking and accounts, and a link to your work and business data, smartphones drive cybercriminals directly to your pocket. As such, they may become the next big vector to hijack and weaponise in distributing attacks.

Mobile cybersecurity threats mostly align with the common threats, including phishing and malware, but they can also include mobile-specific issues such as application-based threats and device and OS-based exploits. Verizon’s Mobile Security Index 2021 found that while 71% of enterprises see mobile devices as critical to their business, 40% also see them as their company’s biggest security risk and 53% said the consequences they faced as a result of a mobile device-related security compromise were major. Moreover, the survey found that 93% of Android devices were running an out-of-date version of the OS, and 49% of workers allowed their family or friends to use their work devices.

Securing mobile devices

As an endpoint in the corporate network, the mobile device needs to be secured with strong PINs, passwords and even biometric logins such as facial recognition and fingerprint scanners. Multi-factor authentication is an authentication method that protects individuals and organisations by requiring users to provide two or more authentication factors to access an application, account, or virtual private network (VPN). This adds extra layers of security to combat more sophisticated cyberattacks, even after credentials or identities have been stolen, exposed, or sold by third parties.

As a key part of the WFA strategy, mobile devices also need to be protected within a Zero Trust model, which stipulates that trust should be explicitly derived from a mix of identity and context-based aspects. Further, zero trust network access (ZTNA) provides per-user access to specific applications, far surpassing implicit trust when it comes to security. Every device, user and application can be seen and controlled regardless of where they are connecting from. Implementing a zero-trust model provided by ZTNA ensures that whenever a user or device requests access to a resource, they are verified before access is given.

By unifying Fortinet’s broad portfolio of zero trust, endpoint, and network security solutions within the Fortinet Security Fabric, Fortinet delivers security, services and threat intelligence that seamlessly follow users whether on the road, at home, or in the office to provide enterprise-grade protection and productivity.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cyber resilience is more than cybersecurity
Technews Publishing Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Read more...
Defining the resilience of cybersecurity
Cyber Security Security Services & Risk Management
Cyber resilience is less buzzword and more critical business strategy as the cybercrime landscape grows in intent and intensity.

Read more...
How to stay cybersafe on business trips
Cyber Security
No matter where you are in the world, tech-savvy criminals are looking for ways to exploit email addresses, social media profiles, passwords, financial data and stored files.

Read more...
The challenge of data safety and availability
Technews Publishing Editor's Choice Cyber Security
Veeam offers backup and recovery software that presents the user with one interface to manage backups to and from almost any platform.

Read more...
How safe are your backups?
Technews Publishing Cyber Security
Immutable backups prevent malware from compromising your data and ensure the right data is restored in an emergency when following a four-step backup process.

Read more...
Growing cyber resilience portfolio
Technews Publishing Cyber Security
Hi-Tech Security Solutions spoke to Richard Frost, who heads up Armata, to find out what the company offers in terms of cyber resilience.

Read more...
Adopting a cyber-secure mindset
Security Services & Risk Management Cyber Security
Adopting a cybersecure mindset is the key to mitigating the risk of falling victim to the growing cybercrime pandemic.

Read more...
Advanced technologies to curb corruption
News Cyber Security IT infrastructure
The use of advanced technology to curb fraud, corruption and cyber-related crimes received a massive boost as the Council for Scientific and Industrial Research (CSIR) and Special Investigation Unit (SIU) agreed to work together.

Read more...
Reversing the hidden risk of permission creep
Cyber Security
Employees can collect a range of access rights to business systems throughout their tenure. It's a phenomenon called 'permission creep': one of the biggest cybersecurity risks for organisations today.

Read more...
Mitigating the risk of zero-day attacks against Microsoft 365
J2 Software Cyber Security
Microsoft 365 servers contain extremely sensitive information and most organisations simply cannot do without it for an extended period of time.

Read more...