contact contact contact
 Advertise
 Contact
 SecurityWatch
  Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR

GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.

Network Security Software - Sponsored by GFI Network Security.

Free VoIP Assessment for your business

The Next Challenge: Mobile Devices Security
Author: IT-Observer Staff
Tuesday, 17 May 2005, 20:26 GMT

IT Managers admit that managing the security pressures posed by the growing number of mobile devices – laptops, Blackberries, USB devices, PDAs etc. – used by employees is the biggest challenge in information security. Yet, they encourage companies to use them.

A recently survey, conducted by Dynamic Markets, questioned some 300 IT managers across Europe about the state of mobile devices security in European IT departments. The findings revealed that 63 percent of respondents admits that they are not able to provide protection for mobile devices, 30 percent could not say how many mobile devices where is use by employees, 60 percent were unable to say how many iPods and USB Keys in use across the corporate network, 62 percent respondents believe that the size of the threat is bigger than the computer glitch which threatened thousands of businesses at the turn of the Millennium.

”Whilst Y2K turned out to be a non-event, at the time it was the only issue on the minds of IT managers because of the scale of the threat and the size of the problem. We find ourselves in the same situation today with mobile security,” said Daniel Power, Regional Manager - Northern Europe, LANDesk Software.”IT managers recognize the scale of the challenge in front of them but don't seem quite certain what to do about it.”

In addition, the survey revealed that the biggest source of concern from a security management perspective is the risk of malware getting onto the network from mobile devices.

Despite the overwhelming results, about 90 percent believe their company should continue encourage the use of mobile devices.

”Security vulnerabilities are increasing in number and severity and the continuing rise of mobile devices is only exacerbating the situation. Controlling it comes down to management,” said Andrew Brown, Programme Manager at IDC.

“Organizations need an effective system in place both from a policy perspective to lay the ground rules and a technology perspective to check and automate those rules. Doing this at a centralized location rather than at the perimeters is the best approach to this. Additionally, the security solution needs to be proactive not only in detecting threats like viruses and spyware, but also in automating the necessary corrective measures, quickly and effectively.”

Monday, May 23, 2005

Network Security

· Hackers get tricky with pharming
· Hiring a hacker? Think again, experts warn
· Why security vulnerabilities expand beyond operating system, enterprise
· How Dangerous Was The Cisco Code Theft?


Free VoIP Assessment for your business


Wireless Security

· picoChip, Hifn unveil WiMAX basestation reference
· Why wireless devices must be connected to critical applications
· Securing 'strange' Wi-Fi devices
· IT giants fight wireless patent

InfoSec Directory

· Phishing attacks and countermeasures
· Overview of image security techniques with applications in multimedia systems
· Inoculating SSH Against Address-Harvesting Worms
· What is the point of encryption if you don’t know who for?


Free VoIP Assessment for your business


Press Releases

· nCipher helps combat phishing attacks with Chip and PIN
· LANDesk Named to 2005 Red Herring Top 100
· HP Simplifies Business Protection for Small and Mid-size Businesses with New Smart Office Program
· Clifford Chance appoints Redbus Interhouse to Provide Pan-European Services
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter