The missing mobile puzzle piece

November 2017 Information Security, Infrastructure

With mobile malware and ransomware proliferating at a rapid rate, companies are recognising the need for security technologies to protect network resources accessed by employees with their devices. But, they’re missing an important piece of the puzzle.

“A mobile management solution holds little ground without a policy in place,” says Michael Morton, a mobile security specialist at Securicom. “Companies are neglecting to define what resources can be accessed and have not identified what devices are already accessing the network. End user training and education are also pushed aside as there’s an assumption that a mobility management solution will take care of the risk. However, it doesn’t work that way.

“Companies should know what devices are accessing their networks. Restrictions should be placed on what information can be accessed, and employees need to understand what they are and why they are there.”

He continues: “A mobile device policy should be developed to define what mobile devices are permitted to access on the network. This sounds elementary, but the number of clients that don’t have a mobile security policy defined is surprising. They know they need to manage mobile devices in the enterprise, but have no idea where or how to implement it. A sound policy is the very foundation.”

The most sensible way to address the burgeoning bring-your-own-device and bring-your-own-app trends is to first define a policy around their usage and then deploy an effective mobility management solution to enforce that policy. To complement this, Morton recommends a Network Access Control (NAC) device.

“This device allows you to define what devices are allowed to connect to your network, and what they are allowed to access once they are on the corporate Wi-Fi. The NAC can also perform some host checking functions and integrate with a mobility management solution. The mobility management tool can inform the NAC if any suspect applications are on a device, and based on this, access to the corporate network can be limited or removed.”

When it comes to mobility management and security tools, not all are created equal. In a true enterprise mobility management solution, features like Application Risk Management and Threat Management can assist in detecting and remediating mobile malware. Application Risk Management reviews the reputation and security state of applications installed across the device base. Threat Management takes it a step further, allowing for the detection, analysis and remediation of malware on mobile devices across the enterprise.

Morton stresses though that combating mobile malware in an enterprise requires a multi-approach that includes the use of such technologies as well as behavioural change.

“Educating your end users around what malware is, how it works, and how to detect and or remove malware from a device is critical to stamping out mobile malware in an enterprise. Most people believe that if they have a mobile security tool or an anti-virus installed, they are protected. However, while these applications greatly assist in protecting devices, the end user has the final say. They are the ones downloading applications from untrusted sites, or opening malicious links in an SMS. As end users, we need to be more security savvy because remember, all cyber criminals have an agenda.”

For more information contact Securicom at www.securicom.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.