5 Mobile Security Steps to Take Now to Protect Your Business

Marco Nielsen, VP, Managed Services, Stratix Corporation

Marco Nielsen, VP, Managed Services, Stratix Corporation

With cyber threats on the rise, the question isn’t really if you’ll get hacked—it’s how you’ll respond when it happens.

The logistics sector is using mobile to drive new levels of productivity and efficiency throughout the enterprise. With the correct tools, companies can track and trace shipments in the field, offer real-time delivery confirmations, and use voice picking anywhere in the distribution center.

"Bring-your-own-device (BYOD) and corporate-owned programs have different requirements, so it’s important to understand the differences before choosing your mobile security route"

Unfortunately, mobile also comes with security risks, from outside threats to rogue employees who can compromise your data. About 56 percent of enterprises say it’s unlikely that they would be able to detect a sophisticated attack, according to EY. Gartner estimated in 2014 that a shocking 75 percent of mobile applications would fail basic security tests over the next year.

There are many aspects to consider when developing a mobile security strategy, from operating systems to applications to traffic. Bring-your-own-device (BYOD) and corporate-owned programs have different requirements, so it’s important to understand the differences before choosing your mobile security route. Focus on these five areas to build a robust mobile security strategy:

1. Secure and Filter Data Traffic.

Could a single Facebook scam compromise your company’s systems? The answer is... maybe.

If your employees access social media channels on their devices, you could be more vulnerable to cyber attacks. In response, many enterprises restrict access to social media or other websites where cyber threats lurk. Luckily, there are many products available to audit and monitor data traffic.

Several products can monitor and filter all data traffic to and from the mobile device. That means instead of just blacklisting a specific application, like Facebook, you can block or monitor all Facebook data traffic so other avenues can’t be used, such as the Facebook web site. Businesses can also invest in products to compress and limit data usage on mobile devices.

Check Out: Top Cybersecurity Companies

2. Protect your Devices

Malware isn’t just for desktops anymore: All types of platforms are susceptible to viruses today, including iOS and Android. There was a 153 percent increase in the number of unique Android malware samples and 70,000 total unique iOS malware samples in 2015, according to the Hewlett Packard Enterprise Cyber Risk Report 2016. Fortunately, businesses can invest in anti-malware screening to identify and contain cyber threats before they turn into problems.

Many of these threats come from fishy applications, so make sure your business is using trustworthy app vendors to avoid installing anything suspicious on your organization’s mobile devices. For added protection, install third-party tools to scan the source code of your apps continuously.

3. Consider a Virtual Private Network (VPN)

Who’s eavesdropping on your conference call? The reality is that it’s pretty simple to listen in on wireless devices. Bad access points are also risky: If your driver ducks into a coffee shop and logs onto your website or a social media site, a hacker can easily spoof a network and gain unauthorized access.

A VPN helps to ensure security for all communication between mobile devices and the enterprise. This security measure encrypts data and requires stricter authentication for users before they access applications or services. Some enterprises also use access point names (APNs), a carrier feature, to protect data that travels to and from the company. In addition, there are options to encrypt voice and text message traffic that might be important for certain high-level employees or departments.

4. Take Extra Precaution for BYOD Environments

While BYOD offers flexibility and lets you leverage assets your workers already own, it comes with increased risks. If your employees use their own phones or tablets at work, one rogue third-party app can wreak havoc on your security and allow unauthorized access to your company’s information. One option is to have separate containers on the device that workers log into, housing all company applications and data in a secured space.

5. Don’t Forget Your Other Smart Devices

Connected fleets are the next big thing in logistics, thanks to the Internet of Things. These smart vehicles can monitor fuel usage, help drivers prevent collisions and more, but they also make security more complex.

Smart devices are often poorly secured and vulnerable. Last year, hackers used security cameras to create a large denial-of-service attack that brought down large pieces of the Internet. Something similar could easily happen within your own networks. Anyone remember the SQL Slammer worm from 2003? Make sure your Wi-Fi access points are secure and establish multiple security levels to protect critical systems. Several network access control (NAC) solutions also support mobile devices.

Keep your Data Secure with Managed Mobile Services

Creating an effective security strategy takes time and resources, but the alternative—letting hackers make off with your customers’ credit card information or company trade secrets—is too big a risk to take.

A managed mobile services provider can help you design a security plan that works with your devices, operating systems and company goals. MMS providers also offer consistent monthly spending and the ability to spread out security investments over multiple years, providing financial as well as mobile security.

Check Out:

Overview | CIOReview

Crunchbase | CIOReview

Glassdoor | CIOReview

Owler | CIOReview

Zoominfo | CIOReview 

CIOReview Clients: Nous Systems

Weekly Brief

Top 10 Logistics Solution Companies in Europe - 2020

Read Also

Logistics Technology Venture Investment

Logistics Technology Venture Investment

Matt Thompson, Partner Kevin Wu, Intern, Skyview Capital
Modern Tech Leaders Are Building Apps, Not Buying Them

Modern Tech Leaders Are Building Apps, Not Buying Them

Mike Pehl, Managing Partner, Guidepost Growth Equity
Venture Capital: Unleashing The Innovative Forces In Logtech

Venture Capital: Unleashing The Innovative Forces In Logtech

Niklas Holck, Founder & CEO, Tradeworks.vc
Intelligent Robotics Help Keep Our Employees Safe

Intelligent Robotics Help Keep Our Employees Safe

Phil Shaw, Divisional Operations Director, Supply Chain – Europe, Xpo Logistics
Adopting IT Advances: Artificial Intelligence And Real Challenges

Adopting IT Advances: Artificial Intelligence And Real Challenges

Scott A. Roberts, Vice President, Logistics, CHEP U.S.A
The Future Of Cloud Ismobile

The Future Of Cloud Ismobile

Rudi Strydom, Head of IT Operations, Technology and Architecture, Imperial South Africa