Case Studies


Strict Standards: Only variables should be assigned by reference in /home/entrep13/public_html/modules/mod_ecosystemeconomics/mod_ecosystemeconomics.php on line 12

No Articles found

Main Top Meta Mod next to case studies Brazil

Digital Ecosystems


Strict Standards: Only variables should be assigned by reference in /home/entrep13/public_html/modules/mod_ecosystemeconomics/mod_ecosystemeconomics.php on line 12

Financial Services


Strict Standards: Only variables should be assigned by reference in /home/entrep13/public_html/modules/mod_ecosystemeconomics/mod_ecosystemeconomics.php on line 12

Health


Strict Standards: Only variables should be assigned by reference in /home/entrep13/public_html/modules/mod_ecosystemeconomics/mod_ecosystemeconomics.php on line 12

Media


Strict Standards: Only variables should be assigned by reference in /home/entrep13/public_html/modules/mod_ecosystemeconomics/mod_ecosystemeconomics.php on line 12

Retail


Strict Standards: Only variables should be assigned by reference in /home/entrep13/public_html/modules/mod_ecosystemeconomics/mod_ecosystemeconomics.php on line 12

Smart Cities and Transportation


Strict Standards: Only variables should be assigned by reference in /home/entrep13/public_html/modules/mod_ecosystemeconomics/mod_ecosystemeconomics.php on line 12

Share this page

Addressing Dwindling Security in The Communications Industry

Tilly Balfe Monday, 14 September 2015.

Voice security within the communications industry is more paramount than ever due to the increasing dependence on telecom companies from businesses, consumers and the government. The invasion into Chancellor Merkel’s communications in October 2013 highlights the consequences of inadequate protection. Furthermore, as the fastest growing sector in the world it also qualifies as the most vulnerable to breach risks and cybercriminals, weighing heavily in the wake of global institution AT&T being attacked in April 2014, when over 500 customers experienced a data breach over the period of a fortnight. Orange France were also targeted in the same month, when hackers stole personal data from 1.3 million clients.

In this mobile-first, hyper-connected world, where two billion consumers worldwide will possess a smartphone by 2016, it is an understatement to claim they are the remote control to our lives. Therefore, mobile security in particular needs regularly updated measures to ensure that breach attempts are kept at bay. Symantec describe mobile as ‘ripe for attack as many people only associate cyber threats with their PCs and neglect even basic security precautions on their smartphones.’

shutterstock 278170997 1

Symantec, the global leader in security aptly said: ‘The Communications industry is undergoing a major transformation’. This growing domination can be attributed to an ever-expanding range of digital devices, advanced data services, and alternative modes of communication such as WhatsApp and Facebook.

In this mobile-first, hyper-connected world, where two billion consumers worldwide will possess a smartphone by 2016, it is an understatement to claim they are the remote control to our lives. Therefore, mobile security in particular needs regularly updated measures to ensure that breach attempts are kept at bay. Symantec describe mobile as ‘ripe for attack as many people only associate cyber threats with their PCs and neglect even basic security precautions on their smartphones.’

Not only can breach incidents be incredibly costly to the corporation – two American sister telecoms paid a combined $3.5 million last year after failing to use protected servers to store personal data – but it results in reputation damage and loss of credibility. It’s not just the telecoms companies themselves being affected either; the Financial Times recently said: ‘More than forty percent of UK businesses have suffered a security breach from work mobile phones in the past 12 months… Which has warned that companies are not taking the dangers of smartphones seriously enough.’

The threat of call monitoring brings an unpleasant new dimension to hacking with privacy being compromised in a grossly personal way. When will this situation resolve? Last September, the scandal that involved the circulation of explicit photographs of celebrities after their iCloud accounts were hacked has added urgency to the issue.

BYOD (Bring Your Own Device) has complicated security matters for companies, with Symantec observing that it ‘is all the rage but it’s scary too’. They have a solution that is a powerful strategy to address the complex BYOD issues and focuses on the source of concern, the data itself and the applications that access it. Instead of trying to control the entire device, you can intelligently apply controls to the individual applications, without touching or affecting the rest of the device or the users’ personal stuff.


Symantec Mobility

With the rise of mobile devices in the workplace, businesses face a conundrum. Eager to reap the benefits of mobility, yet justifiably uneasy about the significant risks involved, organisations are struggling to find the right approach. Proven benefits of mobility include happier employees, increased productivity, and greater business agility. Risks include everything from critical data losses to devastating reputation damage. Ready or not, organisations must tackle the issue head-on. The question isn’t: should employees be able to use mobile devices for work? Mobile devices are already an inescapable part of the workplace landscape. It’s up to IT to both incorporate these devices and manage them within the security of the network. In addition to smartphones, IT must also secure tablets, laptops, portable printers—anything that can connect to your network. Now, businesses must get ahead of the curve to take advantage of what mobility offers while ensuring security, privacy, and control for the enterprise.
We discovered Symantec’s Mobility Solution which allows businesses to empower its team members to work in a mobile-first world, in order to drive productivity and improve customer service and revenue whilst protecting corporate data.

Symantec Mobility: Suite

Offers comprehensive mobile security and management                                                                                
With trusted protection at the device, app and data layers, Symantec Mobility: Suite ensures that corporate data is isolated and protected from data leakage, malware and unauthorised access.

Guarantees one solution for diverse environments
Whether enterprises enforce one standard through corporate-owned devices, or embrace BYOD policies, IT can apply a consistent level of security. Mobility Suite offers the ability to meet a wide range of environments today, plus the flexibility to grow with the enterprise’s evolving mobile needs.

Results in increased employee productivity and satisfaction
Security remains invisible to users with our leading edge app-wrapping technology that allows corporate apps to sit side-by-side with personal apps without intermingling. Give employees device choice and a native user experience while maintaining control over corporate apps and data.

It just goes to show; the solution to complete mobile security is not always as complex as it may first appear. With the correct precautions in place, corruption within the communications industry need not be as common or detrimental to businesses as it currently is.

For further information on Symantec Security and their services, visit their website: http://www.symantec.com/security_response/
Read their 2015 Internet Security Threat Report here: http://www.symantec.com/security_response/publications/threatreport.jsp

For companies interested in more information on EntrepreneurCountry, and how we can help you build the future from the future, contact Ryan Coyne on ryan.coyne@entrepreneurcountry.com

Share this page

Tilly Balfe

Tilly Balfe

Tilly joined entrepreneurcountry in June 2015 as the Research and Content Manager Intern, following her second year of Creative Writing with Publishing at Bath Spa University. Her main responsibilities include managing content on the entrepreneurcountry website, conducting various interviews, and writing articles.

Leave a comment

You are commenting as guest.

ecglobal-mobil-final

united-kingdom