Most people know it’s a good idea to have security and anti-virus software on their computers and servers. But with mobile devices used widely for business, do they need security software too?
Unlike with your company PC, it’s not a given that you need security software on mobile devices. While it does offer protection against some mobile threats, it’s useless against others. This article will help you understand the issues, but it may be wise to consult a knowledgeable IT supplier if you need further help.
The problem is that mobile security is a complex issue. Malware and viruses — which security software can protect against — are not the most serious threats you face. Although growing, the chances of infection remain low. You’re far more likely to suffer data loss by having a mobile device lost or stolen.
Your first priority should therefore be to take some basic mobile security steps, like:
Once you’ve taken these steps, you can consider whether mobile security and anti-virus software has a role to play in keeping your devices, and the data on them, safe.
Some mobile operating systems are more vulnerable to malware than others, so this is a key factor in deciding whether to use security software:
These operating systems are also tightly controlled by Apple and Microsoft. When a security problem is identified, it’s usually fixed quickly.
Although Google does fix Android vulnerabilities promptly, many devices have custom versions of Android that don’t get updated so quickly.
The case for security software is certainly stronger for Android devices, as they have fewer built-in checks to block malicious apps and downloads.
Another factor to consider when evaluating whether you need mobile security software is how much control employees have over their mobile devices.
Mobile device management (MDM) software allows you to manage the devices in your business via a central control panel. For instance, you can restrict staff from installing their own apps or limit how files are shared.
If your company owns the mobile devices its staff uses — and they are used only for business — MDM software is a powerful way to lock down those devices. And if your mobile devices are tightly locked down then there’s less of a need for separate security software, because the restrictions make problems less likely.
However, if your company has embraced bring your own device (BYOD), with staff using their own mobile devices at work, it’s harder to restrict what they can and can’t do. In this kind of situation, mobile security software has a greater role to play.
One area in which security software can be effective is in protecting against rogue apps. These mobile apps aren’t strictly malware or viruses, but use underhand methods to trick you into sharing important data.
For instance, an app might ask to access your address book, relying on the fact that people usually grant permissions without fully understanding the implications.
The app could then harvest and use this data. Names, addresses, phone numbers and email addresses are valuable to online criminals because they can use them to create convincing fake emails or simply sell them to other scammers.
Many mobile security packages include protection against threats like these, as well as blocking fake phishing emails and websites. These are increasingly aimed at mobile users because when they’re on the go, people often respond without stopping to think.
As you’ve seen, mobile device security can seem complicated. What’s more, this is an area that’s changing fast. We’re still learning how to best use mobile devices in business — and we’re still learning how best to protect them, too.
However, a good place to start is with the three elements we’ve covered:
Finally, remember that your people have a big role to play in ensuring you use mobile devices safely. The more they understand the dangers and risks, the lower the chance of your running into problems.
Also make sure your data protection and IT policies cover mobile devices — and check your staff know who to speak to if they need help.
For more information on keeping your data and systems secure, see the Resources box on the right.
You might also find the sections on IT Security and Mobile hardware helpful.
Comments
Add a comment
Not registered? We'll create a new account for you when you add your comment