<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>mobility &#8211; Scolvo</title>
	<atom:link href="https://scolvo.com/corinfo/blog/tag/mobility/feed/" rel="self" type="application/rss+xml" />
	<link>https://scolvo.com/corinfo</link>
	<description>work.regardless</description>
	<lastBuildDate>Mon, 16 Apr 2018 12:26:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.4.6</generator>

<image>
	<url>https://scolvo.com/corinfo/wp-content/uploads/2020/07/ic_launcher.png</url>
	<title>mobility &#8211; Scolvo</title>
	<link>https://scolvo.com/corinfo</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Top Things to Consider When Purchasing Business Mobile Devices</title>
		<link>https://scolvo.com/corinfo/blog/2018/04/16/top-things-to-consider-when-purchasing-business-mobile-devices/</link>
		
		<dc:creator><![CDATA[Krisztian Toth]]></dc:creator>
		<pubDate>Mon, 16 Apr 2018 12:26:37 +0000</pubDate>
				<category><![CDATA[Future workplace]]></category>
		<category><![CDATA[Mobility]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[COPE]]></category>
		<category><![CDATA[CYOD]]></category>
		<category><![CDATA[mobile device]]></category>
		<category><![CDATA[mobility]]></category>
		<category><![CDATA[purchasing]]></category>
		<guid isPermaLink="false">https://scolvo.com/?p=19518</guid>

					<description><![CDATA[<p>To buy or not to buy? Both can be valid options when considering to establish a mobile workforce. But it’s good to know that, although a business can share the responsibility of financing and selecting the devices with the employees, the risks always remain company “privilege.”   &#160; Policy Advisor There are three standard options [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2018/04/16/top-things-to-consider-when-purchasing-business-mobile-devices/">Top Things to Consider When Purchasing Business Mobile Devices</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">To buy or not to buy? Both can be valid options when considering to establish a mobile workforce. But it’s good to know that, although a business can share the responsibility of financing and selecting the devices with the employees, the risks always remain company “privilege.”  </span></p>
<p><span id="more-19518"></span></p>
<p><a href="https://scolvo.com/wp-content/uploads/2018/04/Top-Things-to-Consider-When-Purchasing-Business-Mobile-Devices-1.jpg"><img class="aligncenter size-full wp-image-19522" src="https://scolvo.com/wp-content/uploads/2018/04/Top-Things-to-Consider-When-Purchasing-Business-Mobile-Devices-1.jpg" alt="purchasing business mobile" width="892" height="595" srcset="https://scolvo.com/corinfo/wp-content/uploads/2018/04/Top-Things-to-Consider-When-Purchasing-Business-Mobile-Devices-1.jpg 892w, https://scolvo.com/corinfo/wp-content/uploads/2018/04/Top-Things-to-Consider-When-Purchasing-Business-Mobile-Devices-1-300x200.jpg 300w, https://scolvo.com/corinfo/wp-content/uploads/2018/04/Top-Things-to-Consider-When-Purchasing-Business-Mobile-Devices-1-768x512.jpg 768w" sizes="(max-width: 892px) 100vw, 892px" /></a></p>
<p>&nbsp;</p>
<h1><span style="font-weight: 400;">Policy Advisor </span></h1>
<p><span style="font-weight: 400;">There are three standard options for introducing and working with mobile devices in the workplace, depending on who owns and operates the equipment. We break down the advantages and disadvantages and common arguments for each of these.</span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Bring Your Own Device (BYOD): The Crowd Pleaser</span></h2>
<p><span style="font-weight: 400;">That is by far the most popular approach to mobilization in the workplace, and with </span><a href="https://www.csoonline.com/article/3242151/byod/3-options-for-securing-byod-data.html"><span style="font-weight: 400;">security measures improving</span></a><span style="font-weight: 400;">, the adoption will be </span><a href="https://www.marketsandmarkets.com/PressReleases/byod.asp"><span style="font-weight: 400;">more widespread by the hour</span></a><span style="font-weight: 400;">. North America leads the way where about 50% of companies have adopted a BYOD policy. More cautiously, but Western European companies are also </span><a href="https://ec.europa.eu/growth/tools-databases/dem/monitor/sites/default/files/DTM_BYOD%20-%20a%20major%20security%20concern%20v1.pdf"><span style="font-weight: 400;">becoming open to such a concept</span></a><span style="font-weight: 400;">, although corporate accounts still owned the majority (61%) of business smartphones in 2015. With the abundance of devices out there and the convenience they mean to employees, however, the BYOD trend is only likely to gain more ground. </span></p>
<p><span style="font-weight: 400;">For small businesses, the cost-savings achievable with such a policy are too tempting. The employee buys the hardware itself. The voice and data service costs are billed to their names. The business doesn’t have to sign long and inconveniently binding contracts with carriers. In a recent report, Cisco estimated </span><a href="https://www.dmstechnology.com/3-big-risks-of-byod/"><span style="font-weight: 400;">a USD 350 of savings</span></a><span style="font-weight: 400;"> for every employee, every year, for every business with a BYOD-policy in place. </span></p>
<p><span style="font-weight: 400;">Of course, properly managing the secure and steady operation of these devices and the corporate apps them is an ongoing challenge. Businesses, especially the ones with fewer resources, need to educate themselves on the security and troubleshooting of the used devices.</span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Choose Your Own Device (CYOD): The Golden Middle</span></h2>
<p><span style="font-weight: 400;">A relatively new twist to the BYOD-concept is CYOD, or Choose Your Own Device, that aims to improve the control the IT-departments have over the </span><a href="https://scolvo.com/blog/2016/09/30/indispensable-security-solutions-mobile-app/"><span style="font-weight: 400;">corporate mobile security</span></a><span style="font-weight: 400;">. With CYOD, the ownership of the device is a secondary question. Companies choosing this policy give priority to creating a more homogenous fleet of devices by presenting a set of options for the employees to choose from. This way, they can better control the support and security of these devices. </span></p>
<p><span style="font-weight: 400;">CYOD definitely puts some financial burden on the corporation as it has to </span><a href="https://scolvo.com/blog/2016/09/29/plan-budget-digital-workplace-strategy/"><span style="font-weight: 400;">create a budget</span></a><span style="font-weight: 400;"> for the purchase of some devices. The corporate purchasing process also makes the implementation times longer than BYOD. But if the employee already owns an approved type of device, it is cost saving already. Not to mention the other positive consequence of such a policy: engagement that comes from the possibility of choosing a device that suits the worker.</span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Corporate Owned, Personally Enabled (COPE): The Ultimate Control</span></h2>
<p><span style="font-weight: 400;">Regardless of the apparent advantages of the above mentioned two policies, a corporate-owned mobile fleet is still the standard at large firms. Why? It would be too much to keep an eye on all the issues that stem from the variety of mobile gadget types. </span></p>
<p><span style="font-weight: 400;">The very existence of a mobile fleet in a large corporation automatically induces the necessity of mobile device management and a mobile app management system in place, but at least these solutions don’t have to deal with different operating systems, a thousand different sets of apps, and the same amount of security vulnerabilities. </span></p>
<p><span style="font-weight: 400;">As for cost savings, supplier contracts can be negotiated en mass and based on quantity and make all those services (data, repairs, etc.) a little less expensive. The fleet contracts, on the other hand, have the drawback of being binding even when the technology or the service level should be updated.</span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Role-based Selection: The Pragmatic</span></h2>
<p><span style="font-weight: 400;">Many times, it’s not even about the costs or the security that defines the options for the mobilization of the workforce, rather than the role of the workers. In certain positions, like in construction or at utilities, it is a requirement that a mobile device is resistant to environmental impacts: hence the category of ruggedized tablets and mobiles. </span></p>
<p><span style="font-weight: 400;">Other times, the expectations that drive such purchases are more subtle. It can be the case of personal banking sales agents making a better impression by presenting on an iPad than on an Android device. It can be that real estate agents continuously need to take high-resolution photos or retailers have to have a versatile barcode-reader available at all times, and these functions might all prompt the use of specific devices.</span></p>
<p>&nbsp;</p>
<h1><span style="font-weight: 400;">“How Do We Pay For It?” </span></h1>
<p><span style="font-weight: 400;">As far as company-owned devices go, </span><a href="http://www.itpro.co.uk/desktop-hardware/29337/businesses-choose-pcs-and-laptops-over-mobile-devices"><span style="font-weight: 400;">laptops still lead the way</span></a><span style="font-weight: 400;"> over real mobility enablers like smartphones or tablets. But the fact that corporations mainly spend on laptops doesn’t mean the other devices are not widely used &#8211; they are just mostly purchased and owned by the employees. </span></p>
<p><span style="font-weight: 400;">Once the company has decided that a CYOD or COPE policy is the way to go, it has to deal with more sweet little details and the time-consuming nature of purchasing. </span></p>
<p><span style="font-weight: 400;">Financing options are not as many as the devices on the market, but with a frugal approach, businesses tend to make savvier decisions. Moreover, price sometimes is of lower importance to companies that have to consider so many factors, many of them industry-specific. Software support or repairs and replacement, for examples, can make or break a deal. </span></p>
<p><span style="font-weight: 400;">However, to reach an acceptable price, businesses more often sign long-term contracts with device suppliers and service providers. Phones with SIM cards that tie them to a fixed provider have also been the standard for the business sector, and that’s</span><a href="https://www.computerworld.com/article/3188196/mobile-wireless/u-s-businesses-jump-on-trend-to-buy-unlocked-smartphones.html"><span style="font-weight: 400;"> only started to change recently</span></a><span style="font-weight: 400;">. </span></p>
<p><span style="font-weight: 400;">So what do purchasing departments consider when planning the budget for mobilization? First, they set the priorities: whether it’s a particular type of device, network availability, low monthly fee, or high amount of data. </span></p>
<p><span style="font-weight: 400;">Other than spending a specific amount of the budget on devices as a one-time purchase, they can be leased to the company and forwarded to the workers as COPE. Another option is to sign a hardware compensation agreement with the employees within CYOD and give a certain amount of allowance for hardware purchases. </span></p>
<p><span style="font-weight: 400;">Next comes the service level setting: depending on the provider, data usage, warranty and servicing options, support availability, and flexible modifications choices might have an impact on the monthly service price.</span></p>
<p>&nbsp;</p>
<h1><span style="font-weight: 400;">So Many Devices, So Long Deployment</span></h1>
<p><span style="font-weight: 400;">The deployment of a mobile fleet will depend on the first policy option a company has chosen. </span></p>
<p><span style="font-weight: 400;">BYOD takes off the business’ shoulders a considerable task: selecting (and paying for) the devices. And puts there another: the management. With the workers, all using their mobile gadgets, the deployment of a mobility strategy is about finding a common ground to manage all of those tools. Establishing the basic rules of usage and secure corporate identity with role-specific access for the employees is the first step. In fact, it also a must in creating a safe and controlled mobile environment. Device management can then be fine-tuned by adding dedicated support or other services. </span></p>
<p><span style="font-weight: 400;">Putting mobile device management (MDM) in place is a way to make sure lost or stolen gadgets or using not secure apps don’t lead to corporate data leakage. One step further, an enterprise mobility management (EMM) tool also creates a secure environment for system and app updates. The point is to keep the onboarding process as simple as possible for the employees, to be able to profit from it. </span></p>
<p><span style="font-weight: 400;">CYOD requires the same approach when deploying: having a go-to place for administration and control of security, with the facilitation of having fewer device types to manage. From a deployment perspective, a COPE model is the easiest yet also the longest. The IT department has a massive heads-up by knowing what devices, what operating systems, and what apps they have to keep an eye on. They can do all installations and security settings in bulk. They can make sure everything is working before the employees even get the devices. And they only have to be prepared to maintain a public pool of tools. </span></p>
<p>&nbsp;</p>
<h1><span style="font-weight: 400;">Thoroughness Pays Off</span></h1>
<p><span style="font-weight: 400;">Making purchasing decisions is hard and, in the case of mobility, it ultimately comes down to how much the company is willing to pay for security. Or, how much of that security is it willing to sacrifice for being among the first to mobilize. </span></p>
<p><span style="font-weight: 400;">For large corporations, it is not even a question if they allocate a budget for the control of their mobile fleet. But this budget should be completed with the awareness of the latest technology worth investing in and the management options that make the everyday operations of the mobile workforce safe for the company.  </span></p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2018/04/16/top-things-to-consider-when-purchasing-business-mobile-devices/">Top Things to Consider When Purchasing Business Mobile Devices</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enterprise Mobility in 2018: What to Expect?</title>
		<link>https://scolvo.com/corinfo/blog/2018/01/10/enterprise-mobility-2018/</link>
		
		<dc:creator><![CDATA[Krisztian Toth]]></dc:creator>
		<pubDate>Wed, 10 Jan 2018 09:01:41 +0000</pubDate>
				<category><![CDATA[Trends]]></category>
		<category><![CDATA[2018]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AR]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[enterprise]]></category>
		<category><![CDATA[mobility]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://scolvo.com/?p=19379</guid>

					<description><![CDATA[<p>As well as presenting a heap of opportunities with previously unforeseen mobile capabilities, 2018 will challenge businesses in all phases of mobilization with several threats (e.g., data leakage). Here are some global expectations for the year 2018. &#160; AI and AR Will Extend Our Mobile Boundaries The rise of artificial intelligence didn’t even leave business [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2018/01/10/enterprise-mobility-2018/">Enterprise Mobility in 2018: What to Expect?</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">As well as presenting a heap of opportunities with previously unforeseen mobile capabilities, 2018 will challenge businesses in all phases of mobilization with several threats (e.g., data leakage). Here are some global expectations for the year 2018.</span></p>
<p><span id="more-19379"></span></p>
<p><img class="aligncenter size-full wp-image-19381" src="https://scolvo.com/wp-content/uploads/2018/01/2018-expectations.jpg" alt="2018" width="892" height="595" srcset="https://scolvo.com/corinfo/wp-content/uploads/2018/01/2018-expectations.jpg 892w, https://scolvo.com/corinfo/wp-content/uploads/2018/01/2018-expectations-300x200.jpg 300w, https://scolvo.com/corinfo/wp-content/uploads/2018/01/2018-expectations-768x512.jpg 768w" sizes="(max-width: 892px) 100vw, 892px" /></p>
<p>&nbsp;</p>
<h1><span style="font-weight: 400;">AI and AR Will Extend Our Mobile Boundaries</span></h1>
<p><span style="font-weight: 400;">The rise of artificial intelligence didn’t even leave business mobiles untouched: </span><a href="http://sunsoftonline.com/2017/12/06/ar-vr-defining-new-era-enterprise-mobility/"><span style="font-weight: 400;">it has made its way to the workplace</span></a><span style="font-weight: 400;">. Its capabilities of predicting decisions in basic scenarios have already proved to be an essential addition to the arsenal of efficiency-boosting methods, and some predict </span><a href="https://www.itproportal.com/features/artificial-intelligence-and-the-future-of-enterprise-mobility/"><span style="font-weight: 400;">it will be everywhere by 2022</span></a><span style="font-weight: 400;">.  </span></p>
<p><span style="font-weight: 400;">AI will only gain further ground because of its analytics capabilities in 2018, as businesses increasingly feel pressured to use their data assets. The Internet of Things (IoT) is making the data situation only more pressing. With streamlining business processes, AI can be another excellent tool for savings costs. Meanwhile, the networks are being strengthened with 5G to be able to provide the analysis and insights in the shortest possible timeframes. </span></p>
<p><span style="font-weight: 400;">We are still to see, though, in 2018, where augmented reality (AR) will lead our businesses. There are some obvious applications in the utility sector or in retail that are already taking shape, and the software part of the equation is well-covered anyway. One important thing is still lacking, though: </span><a href="https://www.engadget.com/amp/2017/12/20/vr-and-ar-in-2018/"><span style="font-weight: 400;">a proper headset</span></a><span style="font-weight: 400;">, that would make business put AR in practice (of course </span><a href="https://www.engadget.com/2017/11/21/apple-buys-company-making-mixed-reality-headset/"><span style="font-weight: 400;">Apple</span></a><span style="font-weight: 400;"> and </span><a href="https://www.engadget.com/2017/11/01/microsoft-hololens-hard-hat-european-expansion/"><span style="font-weight: 400;">others</span></a><span style="font-weight: 400;"> are working hard already on solving this problem). </span></p>
<p><span style="font-weight: 400;">On the other hand, the user experience is evolving in many different ways, too. Mobile has the most significant impact of all, prompting the transformation of corporate websites to mobile-first format and progressive web apps. The voice/speaking and chat options penetrate all interfaces, making getting work tasks done and team collaboration easier &#8211; thus improving overall efficiency.</span></p>
<p>&nbsp;</p>
<h1><span style="font-weight: 400;">Services in the Cloud and Other Locations</span></h1>
<p><span style="font-weight: 400;">In the age of ubiquitous connection, offering location-based services is one of the most promising areas of development. For enterprise mobility, it means being able to track workers everywhere, all the time, and helping them with that. Wherever a problem emerges, the office workers can have the backs of their field colleagues: think maps, blueprints, instructions, client data. All employees can save time by using geo-tagged photos and indoor navigation to products in a store or service stations in an office, as popular examples. </span></p>
<p><span style="font-weight: 400;">Similarly, selected information can be made available to clients, allowing them to see whether the maintenance worker is on the way or the sales agent is in a place where he can be available for a call. Customers in specific areas can be shown particular promotions or offered specific benefits or discounts.</span></p>
<p><span style="font-weight: 400;">Cloud services are also on the rise like never before, due to the significant service price drops and the ever-growing popularity of BYOD &#8211; smartphones flooding the workplaces. But businesses have also realized that not every type of data is worth to be trusted to the cloud, so, for security reasons, we will likely see the on-premise storages remain in place for the most business-critical information.</span></p>
<p>&nbsp;</p>
<h1><span style="font-weight: 400;">Security Threats in 2018</span></h1>
<p><span style="font-weight: 400;">New devices, new operating systems, new (consumer) apps &#8211; they all pose a threat in the workplaces </span><a href="http://www.information-age.com/enterprise-mobility-trends-2018-123469550/"><span style="font-weight: 400;">increasingly relying on BYOD</span></a><span style="font-weight: 400;"> (again). </span><a href="https://www.csoonline.com/article/3241727/mobile-security/5-mobile-security-threats-you-should-take-seriously-in-2018.html"><span style="font-weight: 400;">Security experts warn </span></a><span style="font-weight: 400;">that accessing corporate data with poorly secured consumer devices and apps can be one of the most significant challenges to the IT-departments this year. </span></p>
<p><span style="font-weight: 400;">One solution to these pains can be AI itself, with its capabilities of recognizing misuse and signs of breach earlier. The protection will have to be set to prevent the data from leakage, like scanning new apps for these properties. But sometimes even that is not enough, like in the case of phishing and other elaborate methods of hacker trickery, against which further training of employees can be a viable solution. </span></p>
<p><span style="font-weight: 400;">Surprisingly, ransomware is </span><a href="https://www.csoonline.com/article/2912408/malware-cybercrime/lightning-strike-more-likely-than-mobile-malware.html"><span style="font-weight: 400;">not at all that common</span></a><span style="font-weight: 400;"> of a threat than one would imagine &#8211; most breaches we hear about happen on desktops instead. Mostly because app stores do a proper job screening new applications and enterprise apps apparently don’t contain malware, and those are the ways people get their software. On desktops, it is easier for hackers to hide a malicious piece of code and cause significant trouble. </span></p>
<p><span style="font-weight: 400;">All that doesn’t mean, though, that businesses don’t have to be alert to such options on mobiles. The continuous evolvement of malware (especially ransomware) techniques makes them a real threat if once an efficient way of installing them on mobiles is found.</span></p>
<h1><a href="https://scolvo.com/scolvo-sales-ultimate-personal-selling-machine-financial-institutions-arrived/?utm_source=blog-new-assessment&amp;utm_medium=blog&amp;utm_campaign=FS&amp;utm_content=EN"><b>SCOLVO Sales – The ultimate selling machine for financial institutions has arrived:</b></a></h1>
<p><a href="https://scolvo.com/scolvo-sales-ultimate-personal-selling-machine-financial-institutions-arrived/?utm_source=blog-new-assessment&amp;utm_medium=banner&amp;utm_campaign=FS&amp;utm_content=EN"><img class="aligncenter size-full wp-image-18843" src="https://scolvo.com/wp-content/uploads/2017/11/scolvo-fs-brochure-download-1024x177.jpg" alt="financial services brochure" width="1024" height="177" srcset="https://scolvo.com/corinfo/wp-content/uploads/2017/11/scolvo-fs-brochure-download-1024x177.jpg 1024w, https://scolvo.com/corinfo/wp-content/uploads/2017/11/scolvo-fs-brochure-download-1024x177-300x52.jpg 300w, https://scolvo.com/corinfo/wp-content/uploads/2017/11/scolvo-fs-brochure-download-1024x177-768x133.jpg 768w, https://scolvo.com/corinfo/wp-content/uploads/2017/11/scolvo-fs-brochure-download-1024x177-1000x173.jpg 1000w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2018/01/10/enterprise-mobility-2018/">Enterprise Mobility in 2018: What to Expect?</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</title>
		<link>https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/</link>
		
		<dc:creator><![CDATA[Krisztian Toth]]></dc:creator>
		<pubDate>Mon, 11 Sep 2017 07:20:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[enterprise]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[mobility]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://scolvo.com/?p=18344</guid>

					<description><![CDATA[<p>Due to some recent major cyber attacks like Petya and Locky, security has again made it to the top list of concerns of businesses worldwide as they are learning the hacker slang the hard way. Should security be one of your primary concerns, too, we give you a realistic overview of the threats and also [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/">Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Due to some recent <a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html">major</a></span><a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html"><span style="font-weight: 400;"> cyber attacks like Petya an</span></a><span style="font-weight: 400;"><a href="https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html">d Locky</a>, security has again made it to the top list of concerns of businesses worldwide as they are learning the hacker slang the hard way. </span></p>
<p><span id="more-18344"></span></p>
<p><span style="font-weight: 400;">Should security be one of your primary concerns, too, we give you a realistic overview of the threats and also some useful tips on how you can protect your business from such attacks. And not only on the good old desktop: as smartphones are on the way to become the most used devices in the workplace, you need to get ready to protect them as well!</span></p>
<p><img class="aligncenter size-full wp-image-18346" src="https://scolvo.com/wp-content/uploads/2017/09/ransomware.png" alt="mobile ransomware" width="1000" height="750" srcset="https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware.png 1000w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-300x225.png 300w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-768x576.png 768w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-94x70.png 94w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-600x450.png 600w, https://scolvo.com/corinfo/wp-content/uploads/2017/09/ransomware-900x675.png 900w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Business desktops under attack again</span></h2>
<p><span style="font-weight: 400;">Malicious code that blocks access to data or a whole computer by encrypting the files seems a successful recipe for easy money and extensive media attention. They provided an opportunity to talk digital security strategies good and bad as </span><a href="https://en.wikipedia.org/wiki/WannaCry_ransomware_attack"><span style="font-weight: 400;">WannaCry</span></a><span style="font-weight: 400;"> hit corporations like Renault, Deutsche Bahn, and FedEx, and </span><a href="https://www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe"><span style="font-weight: 400;">a reinvented version of Petya </span></a><span style="font-weight: 400;">made its way to Russian and Ukrainian banks, Maersk, and WPP. </span></p>
<p><span style="font-weight: 400;">And this is not ‘just’ about the desktops anymore. With less publicity, attacks such as <a href="https://nerdssupport.com/rise-android-trojan/">Fusob</a>, <a href="https://threatpost.com/svpeng-behind-a-spike-in-mobile-ransomware/126533/">Svpeng</a>, and SMALL, also threatened mobile devices and systems  </span><span style="font-weight: 400;">&#8211; just to mention a few. Enterprise mobility is no safe territory, anymore, and the vulnerability goes further than a weak endpoint: we&#8217;re talking about personal consumer devices storing or accessing company data. </span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Corporate security strategies revised</span></h2>
<p><span style="font-weight: 400;">The broad reach of attacks forced many companies to alter their security policies regarding user control, transparency, the IT-departments’ role, and general awareness, especially as more and more enterprise software has its mobile version developed. </span></p>
<p><span style="font-weight: 400;">The risks can no longer be denied: there is much to do about:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A workforce that is increasingly mobile but not necessarily more experienced in protecting corporate data.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The volume and types of devices used in a workplace and how these devices handle data.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Reshuffling IT’s priorities: taking security measures, educating a wider group of stakeholders. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Analysing all the possible effects of a data breach on the business.</span></li>
</ul>
<p><span style="font-weight: 400;">Besides the prevention measures mentioned above, you will also need protection. For example, anti-virus software makers are also adding their part in preparing for more assistance and expanding even more in the mobile space. </span></p>
<p><span style="font-weight: 400;">Symantec was the last to make the news with two recent acquisitions: </span><a href="https://thestack.com/security/2017/07/12/symantec-to-acquire-israeli-mobile-security-startup-skycure/"><span style="font-weight: 400;">the Israeli Skycure</span></a><span style="font-weight: 400;"> with a focus on predictive threat detection, and </span><a href="http://investor.symantec.com/About/Investors/press-releases/press-release-details/2017/Symantec-to-Acquire-Fireglass-to-Bring-a-Generational-Leap-Forward-in-User-Protection/default.aspx"><span style="font-weight: 400;">Fireglass </span></a><span style="font-weight: 400;">with a browser isolation technology that helps to stop the spreading of malware. </span></p>
<p><a href="https://hitinfrastructure.com/news/trend-micro-adds-mobile-security-device-monitoring-tools"><span style="font-weight: 400;">VMWare has partnered up with Trend Micro</span></a><span style="font-weight: 400;"> to provide better protection against mobile attacks. It does that by allowing IT-administrators to get a birds-eye view of their (ever-growing) network, quickly identify threats, and make more informed decisions based on what they saw.</span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">Securing mobile business applications in a future-proof way </span></h2>
<p><span style="font-weight: 400;">The first step is to accept that every business is at risk: big or small, with or without a field team, working on any operating system. Also, every application is vulnerable to some extent. </span><span style="font-weight: 400;">Then, take time to understand your current type and level of protection, so you&#8217;ll know what you&#8217;re missing: this way, you can react faster in case of an attack.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">More focus on user behavior</span></h3>
<p><span style="font-weight: 400;">In protecting your data in association with mobile apps, user behavior is crucial. From this perspective, your Millennial workforce might be the more at risk. </span></p>
<p><span style="font-weight: 400;">With a security awareness training, you can educate your staff about best practices, such as regularly updating the apps they use and the safety implications of sending mobile data through public wireless networks. </span></p>
<p><span style="font-weight: 400;">The best business mobile apps update themselves automatically for more protection, but it&#8217;s always worth to double-check.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">Application control </span></h3>
<p><span style="font-weight: 400;">As apps are becoming more and more dominant in the modern workplace, their integration becomes more important as well. The anti-virus software, the MDM or EMM should all work together in stopping any possible attacks and allow for maximum security. </span></p>
<p><a href="https://scolvo.com/2016/09/30/indispensable-security-solutions-mobile-app/"><span style="font-weight: 400;">Solutions </span></a><span style="font-weight: 400;">that are independent of the location of the data, like precisely setting access rights and multi-level identification app by app, generally work well. </span></p>
<p><span style="font-weight: 400;">The successful combination of these methods might vary by company, but the goal is clear: to pass </span><a href="https://scolvo.com/2017/02/10/5-checkpoints-pass-secure-mobile-business-app/"><span style="font-weight: 400;">the five security checkpoints</span></a><span style="font-weight: 400;"> of a secure mobile business app. These checkpoints are the following:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure code. Developers use encryption, audits, reviews, testing, approval processes to make sure no malicious code could appear. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure data. Proper and up-to-date encryption of data ensures protection against misuse. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure access. Role-based access provides an extra layer of security to passwords. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure communication. The mobile app and the back-end should communicate with proper encryption and authentication protocols, like SSL/TLS. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secure third-party services. The risk of each provider should be assessed and their security and risk management program revised. </span></li>
</ul>
<p><span style="font-weight: 400;">If you are aware of the industry standards, best practices, and user-generated issues that might have an impact on security, you have already taken a big step forward in securing your mobile business apps. </span></p>
<p>The post <a rel="nofollow" href="https://scolvo.com/corinfo/blog/2017/09/11/mobile-ransomware-attacks-dont-let-your-business-apps-fall-prey-to-malicious-code/">Mobile Ransomware Attacks: Don&#8217;t Let Your Business Apps Fall Prey to Malicious Code</a> appeared first on <a rel="nofollow" href="https://scolvo.com/corinfo">Scolvo</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
