Enterprise Mobility & Collaboration

Issue link: https://raconteur.uberflip.com/i/550532

Contents of this Issue


Page 18 of 19

But, of course, security is a technol- ogy challenge too. "The enterprise" was once a secure silo with on-premise technology, a dedicated data centre, authorised hardware, enterprise soft - ware and a clear perimeter, the office firewall. But in many cases this has been replaced by something more neb- ulous – a fog of code and sometimes of responsibility too. And just visible on the horizon is yet more disruption – the internet of things, the emerging world of inter - connected devices made possible by IPv6 (internet protocol version 6). In this world a mobile device might be a tablet or a phone, but it might also be a car, a camera or telepresence robot, anything that can connect to a local network and then to the internet, or be controlled remotely by a smart device. The implications for UC should be ob - vious. Over the next few years, interna- tional real-time meetings and collabora- tion on anything from simple documents to complex engineering projects will be the norm, and this means a huge variety of smart devices may be controlled re - motely during these collaborations, from smart whiteboards to 3D printers. Recent research by IBM has showed that countless smart devices can easily be hacked, including a car's telematics unit, which was hacked via a modified MP3 file and disabled the car's brakes, a building's heating, air conditioning and security controls, and smart lighting, ex - posing a building's wi-fi passwords. In this new, interconnected world, IBM recommends use of a secure op- erating system with trusted firmware guarantees and a unique identifier, alongside secure authentication. IBM says: "While IPv6 is key to identifying 'things' on networks, 'things' also need a subscription to a trusted identity da - tabase. The concept of traditional au- thentication doesn't apply." Data privacy protection is also es- sential. For example, with mobile payments starting to appear on smart- phones, credit card information may be accessible to any devices that are linked to them, via wi-fi or Bluetooth, along with any corporate credentials that are stored on the device. Data and transmission encryp - tion are both essential, and yet it is astonishing how many of the cloud platforms that have been hacked or compromised in recent years contained unencrypted cus - tomer data, including log-ins and passwords. In the mobile environment, strong application security is a must now that vulnerabilities arising from software bugs are commonplace, as the recent Heartbleed and Bash Shellshock cases have proved. With mobile UC, always remember you carry the enterprise, along with everything and everyone connected to it, in your pocket. Security practices cover everyday behaviour because fallible human beings are always the biggest weakness when it comes to data security STRATEGIES COMPANIES EMPLOY TO REDUCE SECURITY RISKS Source: Azzurri Communications 2014 DO NOT USE PLANNING TO USE IN THE FUTURE CURRENTLY USE 73.1% 13.6% 55.3% 68.9% 22.3% 22.5% 68.5% 22.6% 8.9% 4.6% 31.1% 7.8% 41.9% 41.1% 17.1% Provide a private APN (access point name) so traffic never goes on to a public network Use Exchange ActiveSync policies Train employees in safe data management Use a mobile device management tool Use VPN (virtual private network) to protect private information being sent over a public network ENTERPRISE MOBILITY & COLLABORATION | 19 RACONTEUR | 04 / 08 / 2015 raconteur.net

Articles in this issue

Links on this page

Archives of this issue

view archives of Raconteur - Enterprise Mobility & Collaboration