Mark Reeves, SVP International for Entrust, examines the so called ‘facts’ behind the myth that mobile devices are less secure than desktop PCs.It is hard to remember life before the first capable smartphone. It is similar to recalling an era before the internet. June 29, 2007, marked the beginning of a mobile technology revolution when the first-generation Apple iPhone hit the market. Google and Microsoft soon followed suit with Android and Windows Phone operating systems, and the market exploded.Today, mobile devices are all pervasive and everything from checking emails, looking up train times, watching TV shows, finding directions, playing games and, yes, even making phone calls is second nature to most consumers.It was this consumer-driven demand that directly influenced the enterprise, sparking a critical shift in IT policy that allowed employees and staff to use powerful, consumer-level smartphones and mobile devices for work-related purposes. And as we look around the workplace, there is no doubt that the trends of Bring Your Own Device (BYOD), Choose Your Own Device (CYOD) and Bring Your Own App (BYOA) are now firmly established.Yet despite this growing reliance on mobility, IT decision-makers still incorrectly believe that traditional PCs are more secure than mobile devices. Entrust commissioned analyst firm Forrester to research this issue, and 71 per cent of respondents surveyed somewhat or strongly agreed that the desktop/laptop is secure, compared to 43 per cent who said that mobile devices are secure.The overwhelming perception is that mobile devices are less secure. Even with sand-boxed mobile applications, secure operating systems and savvy mobile users, the perception remains that mobile devices are not computers to be taken seriously. In fact, the complete opposite is true.Whether used for secure physical and logical access, authenticators for digital identities, platforms for soft tokens or even as tools to verify desktop-based transactions to defeat malware, mobile devices, by default, simply have a better security posture than today’s standard PC.When properly managed and protected, mobile devices serve as a formidable platform for securing digital identities and online transactions. Here’s why:
Not an easy target:
Desktop malware – performing malicious app-to-app process migration, native keyboard key-logging and Zeus-style memory-hooking – is not being found in mobile malware samples. Plus, specific mobile vulnerabilities usually have a short lifespan.
Smaller attack surface:
As for Android, malware usually targets specific hardware, firmware and OS versions, which greatly reduces the viability and lucrativeness of large-scale infections.
Designed with security in mind:
Today’s non-jail-broken mobile devices are more secure thanks to a multi-layered approach that’s core to the development of mobile operating systems. Applications installed on mobile devices are digitally signed and / or thoroughly vetted.
A safe ‘sandbox’:
Legitimate applications are also sand-boxed, meaning they can’t share or gain access to each other’s information, an important trait that helps defend against advanced mobile malware.
Proven mobile security:
The strength of mobile platforms is further augmented by third-party security capabilities. Solutions that offer digital certificates, embed transparent one-time pass codes (OTPs) or provide application-specific PIN unlock options further bolster device security.
For many businesses, the true power of mobility isn’t yet being realised. However, employees’ adoption of smartphones and tablets as their preferred work devices of choice is changing many an organisation’s IT landscape.The security that you get out of the box from a mobile operating system already exceeds what you can buy with traditional desktop PC endpoint security. In a world where most users mix usage of PCs, smartphones and tablets, it’s a great opportunity to take advantage of the strength of the computers carried in our pockets.
Tim Nyland-Jones, Information Security Manager at Northgate Vehicle Hire, investigates the ongoing challenges of standardizing IoT software and interoperability, offering practical insights for IT professionals. The Current State of IoT Security Recent statistics highlight the urgency of addressing IoT security: in 2023, IoT devices experienced an average of 5,200 attacks per month, with 32% of
The ISTQB Programme in Depth The ISTQB programme has been developed with the needs of today’s complex systems and delivery methods firmly in mind. With over one million certifications to date, it is, without doubt, the leading global certification scheme in the field of software testing. ISTQB® established, and continues to evolve, the internationally recognized
The Specialist Stream The Specialist Stream contains a number of units that have been developed specifically to address: Non-functional Testing and its constituent parts; Industry specific requirements; Technical requirements. It differs from the other streams in that it is boundless on what it can achieve as new qualifications are launched to expand upon the three-points
The Agile Stream The Agile stream contains only 3 units, but collectively they serve to fulfil the needs of foundation level agile testing through to the differing roles and aspects of a large, distributed agile project. Figure 17 – ISTQB Agile Stream Building on the principles taught at Foundation Level, the stream contains: Agile Tester,
Pass Protect, offered by TSG Training, is a valuable option for those concerned about the possibility of not passing their exam on the first attempt. It acts like an insurance policy, allowing you to resit your exam at a significantly reduced rate. Pass Protect covers one resit per exam purchased, so you don’t have to worry about the cost of an additional attempt if you don’t pass initially.
Enquire Now
Wait! Before You Leave.
How can we help?
Would you like to know more? Click here to arrange a call back with one of our business development managers. They will be able to discuss the course with you and answer any questions you have.