{"id":14108,"date":"2011-07-13T14:51:43","date_gmt":"2011-07-13T04:51:43","guid":{"rendered":"http:\/\/power-up.space\/?p=14108"},"modified":"2011-07-13T14:51:43","modified_gmt":"2011-07-13T04:51:43","slug":"what-security-impacts-do-mobile-devices-have-on-your-business","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=14108","title":{"rendered":"What Security Impacts Do Mobile Devices Have On Your Business?"},"content":{"rendered":"<p>AVG (AU\/NZ) says SMBs can no longer rely on the King Canute approach to iPhone and Android security.  <\/p>\n<p>Melbourne, 13 July 2011 \u2014 As a small business owner or employee, you and your fellow staff members are probably keen to get your hands on the latest smartphones, tablet PCs and portable laptop computers to help you with your daily routine in and out of the office.<\/p>\n<p>Indeed, you probably already have one. The results of a Telstra online survey recently revealed that smartphone ownership has now reached 46 per cent of the mobile phone-owning population in Australia, and will reach 60 per cent by the end of 2011. Almost half of those surveyed (47 per cent) admitted to accessing the Internet from their smartphones during work hours, 13 per cent during business meetings.<\/p>\n<p>Thus the King Canute approach to holding back the flood tide of mobile devices into your business is no longer possible. It\u2019s time to recognise the security threats posed by these devices and put in place the technology, procedures and policies to deal with them.<\/p>\n<p>Does lots of power pose possible threats?<\/p>\n<p>Such is the sophistication of today\u2019s mobile devices that they mirror their desktop computer equivalents in almost every sense. Smartphones today are packed with an immense amount of storage and computing power compared to even five years ago.<\/p>\n<p>The famous quote, &#8220;With great power comes great responsibility&#8221;, is true in this case too. Your employees\u2019 mobile devices are now as much a part of your IT resources as the server or database that you keep your client records on. This in itself means that the apps and files on employees\u2019 devices now start to form a solid element of business risk.<\/p>\n<p>A recent survey carried out by the Ponemon Institute on behalf of AVG Technologies found that 55 percent of consumers are aware that they may be putting their employers\u2019 confidential business information at risk when using their smartphone for both business and personal use. The survey also found that 52 per cent of those who are aware of the risk say that it has happened. However, only 40 per cent are concerned about this!<\/p>\n<p>Lloyd Borrett, Security Evangelist at AVG (AU\/NZ), says, \u201cThe problem here is that not only can people easily lose or mislay these devices, but there is a lot of malicious web-based content out there specifically designed to attack mobile computing users. So all mobile devices need to be password protected and have security software on them.\u201d<\/p>\n<p>This is not plug-and-play computing<\/p>\n<p>While mobile devices can significantly boost employee productivity when used conscientiously, small business owners need to realise that this is not plug-and-play computing. They need to consider whether to allow employees to use mobile devices for both business and personal use. If they are going to be used for both purposes, employers should find out who is using what kind of equipment and what \u201capps\u201d they are using and enforce company security policies to protect the business.<\/p>\n<p>Borrett says, \u201cWe recommend business owners put together a policy document spelling out security requirements and permissible usage. To help, we have developed the AVG Online Security Audit which asks how employees use the company\u2019s and their own equipment \u2014 from computers and laptops to smartphones and USB sticks \u2014 and what policies are in place for the use of business and private hardware, plus access to social networking and other Internet usage.\u201d<\/p>\n<p>AVG (AU\/NZ) then emails the business a personalised audit report created from the information provided which identifies where the problems lie along with recommended actions.<\/p>\n<p>The AVG Small Business Security Guide provides some simple but effective steps small business owners can take to secure their business. The Guide is an 11-page action template covering the establishment of policies and processes to secure workplace practices and deliver governance over technology use. Plus AVG\u2019s Business Resource Centre has a library of guides and tools that can help you protect your business from identity theft, data breaches, online banking break-ins and other computer crimes.<\/p>\n<p>The vulnerability of mobile devices used in business is a very real threat. Laptops and tablets can be hacked over shared Wi-Fi networks in public places and smartphones can be subject to \u2018rooting\u2019 or \u2018jailbreaking\u2019, where the unit\u2019s security settings are disabled by a cyber-criminal seeking a host to embed malware.<\/p>\n<p>AVG provides security software to protect both small businesses and individuals, including free AVG Mobilation software to protect Android-based smartphones and tablets. AVG Internet Security Business Edition protects laptops and notebooks on the move, especially when using Wi-Fi networks, plus the workstations and servers back in your office.<\/p>\n<p>For the series of informative security tips, how-to\u2019s and fact sheets see www.avg.com.au\/resources\/security-tips\/. For video tips from AVG (AU\/NZ), see www.youtube.com\/user\/avgaunz.<\/p>\n<p>Keep in touch with AVG (AU\/NZ)<\/p>\n<p>For breaking news, follow AVG (AU\/NZ) on Twitter at twitter.com\/avgaunz<\/p>\n<p>Join our Facebook community at www.facebook.com\/avgaunz<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AVG (AU\/NZ) says SMBs can no longer rely on the King Canute approach to iPhone and Android security. Melbourne, 13 July 2011 \u2014 As a small business owner or employee, you and your fellow staff members are probably keen to get your hands on the latest smartphones, tablet PCs and portable laptop computers to help<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=14108\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14108","post","type-post","status-publish","format-standard","hentry","category-game-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/14108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14108"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/14108\/revisions"}],"predecessor-version":[{"id":14113,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/14108\/revisions\/14113"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}