Security Market Segment LS
×

Warning

JUser: :_load: Unable to load user with ID: 1373
Friday, 14 May 2010 13:45

Device choice is a "catastrophe waiting to happen": BlackBerry security chief

By

Letting staff choose their own preferred mobile platform is "a catastrophe waiting to happen" and will ultimately restrict the ability of businesses to exploit mobile platforms, the security chief at BlackBerry manufacturer Research In Motion has said.

The notion that CIOs should accommodate whatever mobile phones and other devices their staff choose to use has gained increasing currency in recent years.While that attitude might help attract some staff in the short term, it isn't a sensible strategy from a security perspective, Scott Totzke, Research In Motion's vice president of security, told a media luncheon in Sydney this week.

Having workers pay for their own phones could seem to be "a compelling economic argument," Totzke said, but could ultimately lead to much worse problems. "The platforms are not all created equal. It's probably a catastrophe waiting to happen. There will be a big privacy breach and somebody's going to be on the hook for millions of dollars".

Device-based anti-malware solutions were not likely to be helpful, Totzke said. "The mobile context is completely different to a PC; you've only got so much CPU, computing power, and network capacity. It's really an exercise in managing scarcity. If you spend all the time managing security by adding on products, you end up with a device where security is the thirsty elephant around the watering hole."

Developing those policies can be complicated. Totzke noted that the US Department of Defence's guidelines to securely configuring the BlackBerry run to some 150 pages. Market watchers say it may be some time before that approach is reflected more broadly.


"A big missing component for the ability for CIOs or businesses to deploy mobile fleets is around policy," said David Cannon, program manager telecommunications for analyst IDC Australia. "In the last 12 months, there has been a significant upswing in the amount of organisations interested in being able to mobilise their people properly. That's going to keep heightening this security discussion."

"What we're seeing is a groundswell of people who want to be mobilised," Cannon said. "That pushes you back to a standardised environment, We're at this inflection point in the market. CIOs have to turn around and say 'We're either standardising or we're not', and if not, there's the potential to not be able to mobilise the way you want to."

No matter what policy is in place, human error is inevitable, Totzke noted. "The reality is these devices are going to be lost and stolen -- they're going to be left behind. Today, losing your phone is more heartache than losing your wallet."

DIGITAL MARKETING HAS NO SOCIAL DISTANCING OR TRAVEL RESTRICTIONS

As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email andrew.matler@itwire.com

CONTACT US!

LAYER 1 ENCRIPTION A KEY TO CYBER-SECURITY SOLUTION

Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.

DOWNLOAD!

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments