Dell warns firms not to get complacent over mobile security
Businesses need to focus on managing apps, not devices, says CTO

Managing data and applications on mobile devices should be a priority for IT admins, according to Dell.
Businesses need to focus on the software side of things, not just the hardware it is running on, Don Ferguson, VP and CTO for software at Dell told delegates during a panel discussion.
"Poorly designed software is the main reason for security breaches. Step one [for protection] is to make sure you have proper expertise for developing software," he said at Dell World 2014.
"Mobile device security touches everything from data classification [to] privileges. It's important to secure the device and ensure that only the right people retain rights to the data."
Meanwhile, Prasad Thrikutam, president and global head of applications at Dell Services warned businesses not to get complacent as the sophistication of mobile devices increases.
"There are at least 368 security major breaches to the end of October10 million records have been compromised," he said.
"There are so many windows of vulnerability [on mobiles]. Just the aspect of GPS on phones exposes them. Advertisers can know your position and [hackers can] get into the back end. Most of us use simple, easy to remember, one-finger security codes that makes them easy to access [too]."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Thrikutam's advice is for businesses to implement platform-based security, adopt two-factor authentication, use containers to sandbox data/apps and also direct attention to securing back-end infrastructure.
-
What is polymorphic malware?
Explainer Polymorphic malware constantly changes its code to avoid detection, making it a top cybersecurity threat that demands advanced, behavior-based defenses
-
Outgoing Kaseya CEO teases "this is just the beginning" for the company
Opinion We spoke to Fred Voccola who remains a key figurehead at the firm as it enters its next chapter...
-
Rebooting your BYOD strategy
In-depth With hybrid working becoming the norm, there's a need for a device management overhaul. What does BYOD 2.0 look like?
-
IT Pro Panel: Why BYOD is (sort of) here to stay
IT Pro Panel CIOs explain why they aren’t going all-in on personal devices
-
The IT Pro Podcast: Should companies spy on their employees?
IT Pro Podcast Where’s the line between security and surveillance?
-
What are employers' responsibilities when we use personal tech to work from home?
In-depth With many more months of lockdown ahead of us, and workers reluctant to return to the office full time, it's time to think about roles and responsibilities
-
What is the 'personalisation of IT'?
In-depth With millions of people using personal devices for professional purposes while working from home, consumerisation has entered a new phase
-
WhatsApp delays controversial privacy update for businesses
News Users were asked to share data with WhatsApp’s parent company Facebook in order to continue using the service
-
Lenovo ThinkPad L14 review: It’s not right but it’s okay
Reviews Pleasant enough for simple office tasks
-
The consumerisation of IT continues apace – here’s how your business can benefit
In-depth BYOD may be a fact of business, but there are still more ways organisations can grow by embracing consumer tech