Security chiefs have been warned to pay more attention to user behaviour and the flow of information through their organisations in order to minimise mobile and wireless security incidents.
Gartner analyst John Girard said at the firm's IT Security Summit in London that the power of today's mobile devices, along with the increasing convergence of platforms and standards and the consumerisation of IT, are increasing the security risks.
"When a new technology comes out your [employees] will use those products even if you don't need them, because they're better," he argued.
"Therefore you need to pay attention to the latest versions. The cost of one disclosure can negate the business gains of mobility."
Girard advised firms to protect their enterprise by using network access control and intrusion prevention technologies, on-device data encryption, and identity and access management tools.
"The more the phone gets like a PC, the more it can host malicious code or have its function altered by someone else," warned Girard. "If you are not paying attention, you run the risk of [the mobile device] going the same way as the PC."
There is a lot of attention being paid to how business leaders can use the mobile computing preferences of employees and customers to be more responsive, efficient and successful. This white paper runs through five security considerations for the mobile age.
This Dummies white paper will help you better understand business process management (BPM)