Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages

Mobile Security – Six Key Questions

Mobile Security

Six questions to ask yourself?

By 2020, the volume of global internet traffic is expected to be 95 times that of 2005, and connected devices will outnumber the global population by nearly seven to one. In the UK, fixed internet traffic is set to double every two years, while mobile data traffic is set to increase further at a rate of 25% to 42% per year.

Mobile connectivity is essential to enabling high tempo modern business, for global competitiveness and for the UK’s economy. Working flexibly, whether on the road or homeworking, has become a fact of life for many business owners, managers and employees. This has placed significant importance on ensuring that the remote workforce is fully connected, secure and compliant.

1. Do you have a remote workforce or are you a remote worker?

2. Do you email, message, speak or access sensitive business data from your mobile device?

3. Do you communicate from public spaces such as coffee shops, airport lounges or hotel rooms?

If Yes...

4. Are your mobile devices secured in accordance with company security policy?

5. Is the data that resides on the mobile devices secure?

6. Is the communication between mobile devices and your fixed infrastructure secure?

If No...

"I have nothing to hide so why do I need to secure my communication?"

If you own the information you are sending, and if you are happy that it, or the underlying information may be shared with, or utilised by, 3rd parties then insecure communication or a free "secure communication" app may well be adequate.

In the enterprise sector however the playing field is very different and the sender very rarely owns the risk for that information. So how might an enterprise look to implement a Secure Mobile Strategy?

  • The first step is to identify the needs of the organisation; is the focus just on encrypted communication or is authentication, authorisation or metadata visibility important?
  • Are the devices considered to be at risk, are users able to install software and are security policies enforced locally?
  • Does the enterprise need integration with existing infrastructure, such as extending the secure link from mobile into an existing PBX telephone exchange?
  • Will users be communicating on their own phones (BYOD) or will the enterprise own the devices (COPE).

If you would like to find out more, drop us a line for a no obligation, friendly, no hard sell, chat about how to "secure your remote workers"

Ready to get started?

If you'd like to find out more about Serbus SecureTM, call us on +44(0)1432 870 879 and we'll be happy to chat.

Share this article

Subscribe to mailing list to get similar comms related articles directly to your mailbox.  No spam, no sharing your details, just useful FREE articles.

Back to top