Dell warns firms not to get complacent over mobile security
Businesses need to focus on managing apps, not devices, says CTO
Managing data and applications on mobile devices should be a priority for IT admins, according to Dell.
Businesses need to focus on the software side of things, not just the hardware it is running on, Don Ferguson, VP and CTO for software at Dell told delegates during a panel discussion.
"Poorly designed software is the main reason for security breaches. Step one [for protection] is to make sure you have proper expertise for developing software," he said at Dell World 2014.
"Mobile device security touches everything from data classification [to] privileges. It's important to secure the device and ensure that only the right people retain rights to the data."
Meanwhile, Prasad Thrikutam, president and global head of applications at Dell Services warned businesses not to get complacent as the sophistication of mobile devices increases.
"There are at least 368 security major breaches to the end of October10 million records have been compromised," he said.
"There are so many windows of vulnerability [on mobiles]. Just the aspect of GPS on phones exposes them. Advertisers can know your position and [hackers can] get into the back end. Most of us use simple, easy to remember, one-finger security codes that makes them easy to access [too]."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Thrikutam's advice is for businesses to implement platform-based security, adopt two-factor authentication, use containers to sandbox data/apps and also direct attention to securing back-end infrastructure.
-
Manufacturers report millions in losses as downtime wreaks havoc on operationsNews UK manufacturers are losing up to £736 million every week due to downtime, according to new research, with outages lasting for several days on end.
-
Microsoft gives OpenAI restructuring plans the green lightNews The deal removes fundraising constraints and modifies Microsoft's rights to use OpenAI models and products
-
Rebooting your BYOD strategyIn-depth With hybrid working becoming the norm, there's a need for a device management overhaul. What does BYOD 2.0 look like?
-
IT Pro Panel: Why BYOD is (sort of) here to stayIT Pro Panel CIOs explain why they aren’t going all-in on personal devices
-
The IT Pro Podcast: Should companies spy on their employees?IT Pro Podcast Where’s the line between security and surveillance?
-
What are employers' responsibilities when we use personal tech to work from home?In-depth With many more months of lockdown ahead of us, and workers reluctant to return to the office full time, it's time to think about roles and responsibilities
-
What is the 'personalisation of IT'?In-depth With millions of people using personal devices for professional purposes while working from home, consumerisation has entered a new phase
-
WhatsApp delays controversial privacy update for businessesNews Users were asked to share data with WhatsApp’s parent company Facebook in order to continue using the service
-
Lenovo ThinkPad L14 review: It’s not right but it’s okayReviews Pleasant enough for simple office tasks
-
The consumerisation of IT continues apace – here’s how your business can benefitIn-depth BYOD may be a fact of business, but there are still more ways organisations can grow by embracing consumer tech