Managing mobile security in South Africa

August 2013 Information Security

From smartphones to tablets, mobile devices continue to cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported, leaked, or lost while the Bring Your Own Device (BYOD) movement has dramatically increased the number of expensive security incidents. Even so, corporate information, including sensitive customer information, is increasingly stored on personal mobile devices and not managed by the corporate IT department.

Check Point Software Technologies recently published its second mobile security report, revealing that the majority of businesses (79%) in the United States, Canada, United Kingdom, Germany, and Japan had a mobile security incident in the past year, with the costs proving substantial. The new report found mobile security incidents tallied up to over six figures for 42% of businesses, including 16% who put the cost at over R5,1 million.

Doros Hadjizenonos, sales manager at Check Point South Africa.
Doros Hadjizenonos, sales manager at Check Point South Africa.

To contextualise these findings for the South African market, Doros Hadjizenonos, sales manager at Check Point South Africa provides insight into trends driving mobile security in South Africa, challenges facing the South African mobile security market, top tips for businesses regarding managing mobile security and predictions for the future of mobile security in the South African market.

1. What are the top three trends driving mobile security in South Africa?

a. The increasing mobility of the work force: The work force is becoming more mobile which means they require information to be available at their fingertips, and as such require a solution to protect this information from getting into the wrong hands. The form factor of these devices makes them more prone to being lost.

b. The rise of mobile device exploits: We are seeing an increase in the number of exploits on mobile devices (especially smartphones) which increases the security risk profile of allowing such devices to connect to the corporate network.

c. Adhering to the Protection of Personal Information Act: The imminent Protection of Personal Information Act will hold companies responsible for loss of personal information. Assuming that these mobile devices have access to personal information about their clients makes it imperative to secure the devices as you would with a laptop or even a desktop.

2. Are the findings of the latest Check Point mobile security report in line with the SA market?

Mostly, yes. I would agree that the number of devices connecting to the corporate network is on the increase – 96% of companies surveyed in the report confirm this. BYOD most definitely creates challenges for security administrators and business owners, where a balance needs to be found between security and convenience. The report found 63% of businesses do not manage corporate information on personal devices, and 93% face challenges adopting BYOD policies.

3. What are the key hurdles or challenges facing the South African mobile security market?

a. The major hurdle that I see is the impact of security exploits on the end user. Security should be a business enabler and not an inhibitor. Users should be able to bring their own device and use it for both personal and business practices, without compromising any functionality.

b. In addition, I believe that users need to be educated on the safe use of mobile devices, creating the need for companies to establish a security awareness programme – ensuring the security message is communicated to all employees.

4. What are your top tips for businesses when it comes to managing mobile security in South Africa?

a. Embark on a mobile security project to ensure that the enterprise data stored on mobile devices is secured. It is vital to choose a solution that minimises the impact on the end user.

b. Ensure there is a security awareness programme to educate users about the risks of mobile devices. This programme should also be extended to cover all devices which connect to the network i.e. tablets, laptops, desktop PCs and notebooks.

5. What are your predications for the future of mobile security in South Africa?

a. I believe that we will continue to see an increase in attacks targeted at mobile devices – smartphones specifically. South Africans have accepted and adopted a mobile device as a primary form of communication and I don’t see this trend changing anytime soon. As legislation comes into effect I believe that cor-porates will take mobile security more seriously.

b. The devices that are used in the work place are not always corporate owned devices – making managing BYOD more complicated. Looking ahead, I believe that corporates will place more emphasis on ensuring that corporate data remains secure, but at the same time not prohibiting employees from using their devices for personal use.

As organisations continue to face challenges with mobile threats, the Check Point Mobile Access Software Blade provides a safe and easy solution to connect to corporate applications over the Internet with smartphones, tablets, or PCs. The solution provides enterprise-grade remote access via both Layer-3 VPN and SSL VPN, allowing for simple, safe and secure connectivity to email, calendar, contacts, and corporate applications.

For more information contact Check Point South Africa, +27 (0)11 319 7267, [email protected], www.checkpoint.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.