<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; Scolvo</title>
	<atom:link href="https://scolvo.com/corinfo/blog/category/blog-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://scolvo.com/corinfo</link>
	<description>work.regardless</description>
	<lastBuildDate>Mon, 06 Nov 2017 10:03:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.4.6</generator>

<image>
	<url>https://scolvo.com/corinfo/wp-content/uploads/2020/07/ic_launcher.png</url>
	<title>Security &#8211; Scolvo</title>
	<link>https://scolvo.com/corinfo</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</title>
		<link>https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/</link>
		
		<dc:creator><![CDATA[Krisztian Toth]]></dc:creator>
		<pubDate>Mon, 11 Sep 2017 07:20:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[enterprise]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[mobility]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://scolvo.com/?p=18344</guid>

					<description><![CDATA[<p>Due to some recent major cyber attacks like Petya and Locky, security has again made it to the top list of concerns of businesses worldwide as they are learning the hacker slang the hard way. Should security be one of your primary concerns, too, we give you a realistic overview of the threats and also [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/">Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Due to some recent <a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html">major</a></span><a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html"><span style="font-weight: 400;"> cyber attacks like Petya an</span></a><span style="font-weight: 400;"><a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html">d Locky</a>, security has again made it to the top list of concerns of businesses worldwide as they are learning the hacker slang the hard way. </span></p>
<p><span id="more-18344"></span></p>
<p><span style="font-weight: 400;">Should security be one of your primary concerns, too, we give you a realistic overview of the threats and also some useful tips on how you can protect your business from such attacks. And not only on the good old desktop: as smartphones are on the way to become the most used devices in the workplace, you need to get ready to protect them as well!</span></p>
<p><img class="aligncenter size-full wp-image-18346" src="https://scolvo.com/wp-content/uploads/2017/09/ransomware.png" alt="mobile ransomware" width="1000" height="750" srcset="https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware.png 1000w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-300x225.png 300w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-768x576.png 768w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-94x70.png 94w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-600x450.png 600w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-900x675.png 900w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Business desktops under attack again</span></h2>
<p><span style="font-weight: 400;">Malicious code that blocks access to data or a whole computer by encrypting the files seems a successful recipe for easy money and extensive media attention. They provided an opportunity to talk digital security strategies good and bad as </span><a href="https://en.wikipedia.org/wiki/WannaCry_ransomware_attack"><span style="font-weight: 400;">WannaCry</span></a><span style="font-weight: 400;"> hit corporations like Renault, Deutsche Bahn, and FedEx, and </span><a href="https://www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe"><span style="font-weight: 400;">a reinvented version of Petya </span></a><span style="font-weight: 400;">made its way to Russian and Ukrainian banks, Maersk, and WPP. </span></p>
<p><span style="font-weight: 400;">And this is not ‘just’ about the desktops anymore. With less publicity, attacks such as <a href="https://nerdssupport.com/rise-android-trojan/">Fusob</a>, <a href="https://threatpost.com/svpeng-behind-a-spike-in-mobile-ransomware/126533/">Svpeng</a>, and SMALL, also threatened mobile devices and systems  </span><span style="font-weight: 400;">&#8211; just to mention a few. Enterprise mobility is no safe territory, anymore, and the vulnerability goes further than a weak endpoint: we&#8217;re talking about personal consumer devices storing or accessing company data. </span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Corporate security strategies revised</span></h2>
<p><span style="font-weight: 400;">The broad reach of attacks forced many companies to alter their security policies regarding user control, transparency, the IT-departments’ role, and general awareness, especially as more and more enterprise software has its mobile version developed. </span></p>
<p><span style="font-weight: 400;">The risks can no longer be denied: there is much to do about:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A workforce that is increasingly mobile but not necessarily more experienced in protecting corporate data.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The volume and types of devices used in a workplace and how these devices handle data.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Reshuffling IT’s priorities: taking security measures, educating a wider group of stakeholders. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Analysing all the possible effects of a data breach on the business.</span></li>
</ul>
<p><span style="font-weight: 400;">Besides the prevention measures mentioned above, you will also need protection. For example, anti-virus software makers are also adding their part in preparing for more assistance and expanding even more in the mobile space. </span></p>
<p><span style="font-weight: 400;">Symantec was the last to make the news with two recent acquisitions: </span><a href="https://thestack.com/security/2017/07/12/symantec-to-acquire-israeli-mobile-security-startup-skycure/"><span style="font-weight: 400;">the Israeli Skycure</span></a><span style="font-weight: 400;"> with a focus on predictive threat detection, and </span><a href="http://investor.symantec.com/About/Investors/press-releases/press-release-details/2017/Symantec-to-Acquire-Fireglass-to-Bring-a-Generational-Leap-Forward-in-User-Protection/default.aspx"><span style="font-weight: 400;">Fireglass </span></a><span style="font-weight: 400;">with a browser isolation technology that helps to stop the spreading of malware. </span></p>
<p><a href="https://hitinfrastructure.com/news/trend-micro-adds-mobile-security-device-monitoring-tools"><span style="font-weight: 400;">VMWare has partnered up with Trend Micro</span></a><span style="font-weight: 400;"> to provide better protection against mobile attacks. It does that by allowing IT-administrators to get a birds-eye view of their (ever-growing) network, quickly identify threats, and make more informed decisions based on what they saw.</span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Securing mobile business applications in a future-proof way </span></h2>
<p><span style="font-weight: 400;">The first step is to accept that every business is at risk: big or small, with or without a field team, working on any operating system. Also, every application is vulnerable to some extent. </span><span style="font-weight: 400;">Then, take time to understand your current type and level of protection, so you&#8217;ll know what you&#8217;re missing: this way, you can react faster in case of an attack.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">More focus on user behavior</span></h3>
<p><span style="font-weight: 400;">In protecting your data in association with mobile apps, user behavior is crucial. From this perspective, your Millennial workforce might be the more at risk. </span></p>
<p><span style="font-weight: 400;">With a security awareness training, you can educate your staff about best practices, such as regularly updating the apps they use and the safety implications of sending mobile data through public wireless networks. </span></p>
<p><span style="font-weight: 400;">The best business mobile apps update themselves automatically for more protection, but it&#8217;s always worth to double-check.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">Application control </span></h3>
<p><span style="font-weight: 400;">As apps are becoming more and more dominant in the modern workplace, their integration becomes more important as well. The anti-virus software, the MDM or EMM should all work together in stopping any possible attacks and allow for maximum security. </span></p>
<p><a href="https://scolvo.com/2016/09/30/indispensable-security-solutions-mobile-app/"><span style="font-weight: 400;">Solutions </span></a><span style="font-weight: 400;">that are independent of the location of the data, like precisely setting access rights and multi-level identification app by app, generally work well. </span></p>
<p><span style="font-weight: 400;">The successful combination of these methods might vary by company, but the goal is clear: to pass </span><a href="https://scolvo.com/2017/02/10/5-checkpoints-pass-secure-mobile-business-app/"><span style="font-weight: 400;">the five security checkpoints</span></a><span style="font-weight: 400;"> of a secure mobile business app. These checkpoints are the following:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure code. Developers use encryption, audits, reviews, testing, approval processes to make sure no malicious code could appear. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure data. Proper and up-to-date encryption of data ensures protection against misuse. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure access. Role-based access provides an extra layer of security to passwords. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure communication. The mobile app and the back-end should communicate with proper encryption and authentication protocols, like SSL/TLS. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure third-party services. The risk of each provider should be assessed and their security and risk management program revised. </span></li>
</ul>
<p><span style="font-weight: 400;">If you are aware of the industry standards, best practices, and user-generated issues that might have an impact on security, you have already taken a big step forward in securing your mobile business apps. </span></p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/">Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Checkpoints to Pass for a Secure Mobile Business App</title>
		<link>https://scolvo.com/corinfo/blog/2017/02/10/5-checkpoints-pass-secure-mobile-business-app/</link>
		
		<dc:creator><![CDATA[Krisztian Toth]]></dc:creator>
		<pubDate>Fri, 10 Feb 2017 13:09:56 +0000</pubDate>
				<category><![CDATA[Data breach]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[Development]]></category>
		<category><![CDATA[Mobile application]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://scolvo.com/?p=17884</guid>

					<description><![CDATA[<p>[spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1/1&#8243; el_position=&#8221;first last&#8221;] Clients usually overestimate the risks of using a mobile apps for business &#8211; developers, on the other hand, tend to underestimate them. Your task as a consultant is to meet both of them halfway. And, in order to do [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/02/10/5-checkpoints-pass-secure-mobile-business-app/">5 Checkpoints to Pass for a Secure Mobile Business App</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>[spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1/1&#8243; el_position=&#8221;first last&#8221;]</p>
<p>Clients usually overestimate the risks of using a mobile apps for business &#8211; developers, on the other hand, tend to underestimate them. Your task as a consultant is to meet both of them halfway. And, in order to do so, you should be aware of the industry standards, best practices, and user-generated issues that would have an impact on security.</p>
<p>[/spb_text_block] [spb_image image=&#8221;17750&#8243; image_size=&#8221;full&#8221; frame=&#8221;noframe&#8221; caption_pos=&#8221;hover&#8221; remove_rounded=&#8221;yes&#8221; fullwidth=&#8221;no&#8221; overflow_mode=&#8221;none&#8221; link_target=&#8221;_self&#8221; lightbox=&#8221;no&#8221; intro_animation=&#8221;none&#8221; animation_delay=&#8221;200&#8243; width=&#8221;1/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1/1&#8243; el_position=&#8221;first last&#8221;]</p>
<p>There are many ways to secure an enterprise mobile application, and in most of the cases, some combination of these methods will lead to a truly secure outcome.</p>
<p>If part of a solid IT security policy, or, rather, a mobile security framework, that’s a good start. Then comes the assessment of risks regarding the mobile applications and finding the right solutions to control the security of all the elements of the mobile workflow.</p>
<p>Prevention and protection is of equal importance: you can read about the basics of this concept in a <a href="http://blog.scolvo.com/en/indispensable-security-solutions-for-your-mobile-app">previous SCOLVO blog</a>. This time, we present the major checkpoints mobile solutions need to pass to be considered secure.</p>
<p>&nbsp;</p>
<h2>Checkpoint 1: The Code is Secure</h2>
<p>The absolute minimum due diligence from the part of a mobile app developer is to use secure codes. During the development, there are several steps to ensure that no malicious code could appear at any stage of the process, through reverse engineering or tampering or in any other way.</p>
<p>By encrypting the code, it will hardly be accessible to those with bad intentions. Audits, reviews, penetration testing, and releases pending on security expert approvals can further enhance security and ensure that vulnerabilities are discovered on time.</p>
<p>When a code is publicly readable, its flaws might become attack surfaces and the application itself modified. Then the business runs the risk of users downloading the modified version and become targets of attack.</p>
<p>&nbsp;</p>
<h2>Checkpoint 2: The Data is Secure</h2>
<p>In the case of enterprise apps, the data, often sensible with significant business value, is stored on the users’ devices. Developers need to use special encryption algorithms (SCOLVO, for example, uses elliptic curve cryptography) to protect these data from misuse. Data can also be encrypted by its elements to make its transfer safer.</p>
<p>Also, the algorithms used for encryption should be up-to-date, in order to provide maximum security: good development teams closely monitor the latest trends and best practices industry-wide to select the most effectives security solutions.</p>
<p>Data leaking from mobile devices and apps is a threat that should be taken seriously. I<a href="https://www.lookout.com/news-and-press/press-releases/a-mobile-data-breach-could-cost-an-enterprise-264-million">n a report by Lookout and Ponemon Institute</a>, the economic risk of a mobile data breach is put as high as $26.4mn, adding the two-thirds of the companies had already had some kind of mobile breach to pay for.</p>
<p>&nbsp;</p>
<h2>Checkpoint 3: The Access is Secure</h2>
<p>We all know how insecure passwords can be: so many users are just unaware of the security risks certain practices or their devices pose. Still, poor password management can be fought with encryption methods, but even better is a role-based access that provides an extra layer of security by only allowing the user to see the information essential to his or her job. Different profiles can then be managed by an Identity Access Management system.</p>
<p>According to Gemalto’s <a href="http://breachlevelindex.com/">Breach Level Index</a>, identity theft is the most common type of breach with a 58% share of the total and counting.</p>
<p>The good news is that even small, competent teams that use the right tools can effectively protect their business users from failing this way by encrypting sensitive information in configuration files, and making sure all security settings are turned to the maximum by default.</p>
<p>&nbsp;</p>
<h2>Checkpoint 4: The Communications are Secure</h2>
<p>Communications between the mobile app and the backend systems or third-party services should be secured by proper encryption and authentication. A common protocol is a basic authentication with SSL/TLS encryption, while communication in production environments can be made secure by the involvement of certificate authorities.</p>
<p>&nbsp;</p>
<h2>Checkpoint 5: The Third-Party Services are Secure</h2>
<p>In protecting an application against malware or fighting attacks, a third-party service provider, usually for cloud infrastructure, can play a key role. Since they prone natural targets for a security breach, developers should be aware of the security and risk management programs of their provider. (At SCOLVO, we choose Amazon Web Services, the leading IaaS provider in Germany, that meet the major security certificates’ criteria and is regularly audited.)</p>
<p>They also have to assess the risk of each provider, depending on the sensitivity of the data they have access to, especially since the number of data breaches associated with these providers have increased by 22%, <a href="http://www.pwc.com/gx/en/issues/cyber-security/information-security-survey.html">a PwC report shows</a>. Furthermore, advertising and analytics can be gateways to security breaches, as they usually involve a better-than-average amount of data transfer.</p>
<p>While cutting back on these activities and sticking to the core functions can be a viable solution to decrease the risks, it is not always the most wanted. Regular monitoring of activities of the application by the development team and saving data to other storages allows the organization to prevent attacks or fixing vulnerabilities in time.</p>
<p>&nbsp;</p>
<p>Let your clients enjoy the power of mobility without complications &#8211; Join the SCOLVO partner community today!</p>
<p>[/spb_text_block]</p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/02/10/5-checkpoints-pass-secure-mobile-business-app/">5 Checkpoints to Pass for a Secure Mobile Business App</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>4 Challenges of Mobilizing Businesses in 2017</title>
		<link>https://scolvo.com/corinfo/blog/2017/01/05/4-challenges-mobilizing-businesses-2017/</link>
		
		<dc:creator><![CDATA[Krisztian Toth]]></dc:creator>
		<pubDate>Thu, 05 Jan 2017 13:35:11 +0000</pubDate>
				<category><![CDATA[Challenge]]></category>
		<category><![CDATA[Digitalization]]></category>
		<category><![CDATA[Enterprise mobility]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Mobility]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://scolvo.com/?p=17895</guid>

					<description><![CDATA[<p>[spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1/1&#8243; el_position=&#8221;first last&#8221;] With businesses worldwide finally getting the message about an inevitable digitalization and mobilization, we surely welcome the large-scale improvements it will bring. However, there will be challenges along the way, and the more you’re prepared the more likely you [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/01/05/4-challenges-mobilizing-businesses-2017/">4 Challenges of Mobilizing Businesses in 2017</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>[spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1/1&#8243; el_position=&#8221;first last&#8221;]</p>
<p>With businesses worldwide finally getting the message about an inevitable digitalization and mobilization, we surely welcome the large-scale improvements it will bring. However, there will be challenges along the way, and the more you’re prepared the more likely you are to exploit the benefits of new technologies.</p>
<p>[/spb_text_block] [spb_image image=&#8221;17772&#8243; image_size=&#8221;full&#8221; frame=&#8221;noframe&#8221; caption_pos=&#8221;hover&#8221; remove_rounded=&#8221;yes&#8221; fullwidth=&#8221;no&#8221; overflow_mode=&#8221;none&#8221; link_target=&#8221;_self&#8221; lightbox=&#8221;no&#8221; intro_animation=&#8221;none&#8221; animation_delay=&#8221;200&#8243; width=&#8221;1/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1/1&#8243; el_position=&#8221;first last&#8221;]</p>
<h2>Challenge #1: Speed</h2>
<p>Now that the early adopters’ time is up, every other business has to act quickly and commit to digitalization. I<a href="https://hbr.org/2016/04/a-chart-that-shows-which-industries-are-the-most-digital-and-why">n a research done by McKinsey last year</a>, figures show some industries clearly emerging, not so much for digitalizing their assets, but for a faster adoption of digital processes and interactions and a larger amount of digital workers. Tech’s lead is no surprise, but media, finance, and professional services are also in the top league. Companies operating in these sectors have workforces that are 13 times more engaged digitally than others &#8211; thus that much more of a chance to improve productivity.</p>
<p>Businesses are not just going digital, but many are going mobile-first. New processes and workflows are translated to mobile procedures before anything else. This trend requires a lot more applications though (<a href="http://www.prnewswire.com/news-releases/global-mobile-enterprise-application-market-2016-2021-market-to-grow-from-usd-4824-billion-in-2016-to-usd-9803-billion-by-2021---research-and-markets-300378097.html">the market segment is expected to double in five years’ time</a>), so development cycles have to be quicker. Those procedures that can’t be mobilized can still be automated with technology.</p>
<h2></h2>
<h2>Challenge #2: Security</h2>
<p>Wherever sensitive data is being created there will be a chance of a cyber-attack. Fortunately, not only the criminals’ tools are improving. Mobile devices with access to business-sensitive information can be protected either with an Enterprise Mobility Management (EMM) tool, or with mobile threat defense, or combining the two. Choose what fits your company best but don’t choose to ignore the threat &#8211; a mobile data breach can cost the enterprise <a href="http://www.prnewswire.com/news-releases/a-mobile-data-breach-could-cost-an-enterprise-264-million-300224208.html">as much as $26.4 million</a>.</p>
<h2></h2>
<h2>Challenge #3: New devices</h2>
<p>No need to fight this: employees will continue to bring in their personal devices (mobiles, tablets, and increasingly, wearables), but this is going to be your smallest problem in the coming years. The Internet of Things (IoT) will pose a much greater challenge: with over <a href="http://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-of-internet-of-things-forecasts-and-market-estimates-2016/#75fae2af4ba5">30 billion devices connected in a few years</a>, you will need the proper business apps for them, just as you have them for other devices. It will require more complex platforms to have everything under control, together with a solid backend infrastructure.</p>
<p>Besides the technical challenges, there will also be the task of finding where to fit these new devices in the business processes. On a more positive note, if you succeed, you will be rewarded by extra productivity gains and even more cost savings.</p>
<h2></h2>
<h2>Challenge #4: New user demands</h2>
<p>Users have grown together with the digital age already have high expectations towards digital tools in the workplace, only to be outdone by the digital native generation. Millennials had caused quite a shock when taking over the workforce, demanding, even more, accessibility, even more functionality of the tools, and, most of all, <a href="http://searchmobilecomputing.techtarget.com/feature/Mobile-user-experience-design-key-to-app-success">a seamless user experience</a>.</p>
<p>[/spb_text_block]</p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/01/05/4-challenges-mobilizing-businesses-2017/">4 Challenges of Mobilizing Businesses in 2017</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
