The missing mobile puzzle piece

November 2017 Information Security, Infrastructure

With mobile malware and ransomware proliferating at a rapid rate, companies are recognising the need for security technologies to protect network resources accessed by employees with their devices. But, they’re missing an important piece of the puzzle.

“A mobile management solution holds little ground without a policy in place,” says Michael Morton, a mobile security specialist at Securicom. “Companies are neglecting to define what resources can be accessed and have not identified what devices are already accessing the network. End user training and education are also pushed aside as there’s an assumption that a mobility management solution will take care of the risk. However, it doesn’t work that way.

“Companies should know what devices are accessing their networks. Restrictions should be placed on what information can be accessed, and employees need to understand what they are and why they are there.”

He continues: “A mobile device policy should be developed to define what mobile devices are permitted to access on the network. This sounds elementary, but the number of clients that don’t have a mobile security policy defined is surprising. They know they need to manage mobile devices in the enterprise, but have no idea where or how to implement it. A sound policy is the very foundation.”

The most sensible way to address the burgeoning bring-your-own-device and bring-your-own-app trends is to first define a policy around their usage and then deploy an effective mobility management solution to enforce that policy. To complement this, Morton recommends a Network Access Control (NAC) device.

“This device allows you to define what devices are allowed to connect to your network, and what they are allowed to access once they are on the corporate Wi-Fi. The NAC can also perform some host checking functions and integrate with a mobility management solution. The mobility management tool can inform the NAC if any suspect applications are on a device, and based on this, access to the corporate network can be limited or removed.”

When it comes to mobility management and security tools, not all are created equal. In a true enterprise mobility management solution, features like Application Risk Management and Threat Management can assist in detecting and remediating mobile malware. Application Risk Management reviews the reputation and security state of applications installed across the device base. Threat Management takes it a step further, allowing for the detection, analysis and remediation of malware on mobile devices across the enterprise.

Morton stresses though that combating mobile malware in an enterprise requires a multi-approach that includes the use of such technologies as well as behavioural change.

“Educating your end users around what malware is, how it works, and how to detect and or remove malware from a device is critical to stamping out mobile malware in an enterprise. Most people believe that if they have a mobile security tool or an anti-virus installed, they are protected. However, while these applications greatly assist in protecting devices, the end user has the final say. They are the ones downloading applications from untrusted sites, or opening malicious links in an SMS. As end users, we need to be more security savvy because remember, all cyber criminals have an agenda.”

For more information contact Securicom at www.securicom.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.