Early this year, we all watched the legal battle between Apple and the FBI unfold about access to the iPhone 5C used in the 2015 San Bernardino massacre. The feud ended, at least temporarily, on March 28 when the FBI withdrew its case from the courts after a third-party managed to unlock the device. With no real resolution provided, additional court cases have popped up surrounding the critical issue of digital privacy, and this month, the Florida Court of Appeals ruled that the government can force an iPhone user to release the passcode to unlock his/her phone.
As cybersecurity presents an increasingly complex and concerning environment for personal, business and government safety, attention to the secure use of mobile devices is more important than ever for individuals around the world. In fact, recent news of cybercriminals and hackers having connections deeply rooted in the Russian government, as well as the thousands of unauthorized “app stores” hosted in China, has underscored the growing number of threats in existence — and therefore a clear need to be proactive.
From the telephone to email to intranets to enterprise social networks, businesses have long worked to apply the latest technologies in the hopes of improving efficiency and productivity. Despite the effort, it appears many companies are currently missing the mark. In fact, according to a recent Global Engagement Survey conducted by Oracle, 56 percent of employees reported not having access to the latest technology needed to do their jobs well.
In this environment of expanding digital workspaces, mobile devices are connected to more data than at any other time in history. Study after study shows that mobile access is increasing at an exponential rate. This comes as no surprise given that each of us are finding ways to use our mobile devices for an incredible number of functions, from sending email to conducting research, from shopping to looking up driving directions, from accessing company resources to creating on-the-job efficiencies.
Whether you’re an avid “From the Orchard” reader or simply view our blog from time to time, it’s likely you’ve noticed that we do our best to keep you out in front of major security threats and aware of ways to help combat them in your organization. While it’s probably no surprise that corporate-provided and BYOD (bring your own device) mobile assets pose a substantial risk to your company data, it’s important to understand that a balance between technology solutions and human solutions is the best way to protect your organization from harm.