The mobile strategy decision making process
When you are making a decision to invest in mobile technology, how far does your business go to include the people that will actually use that technology? Recent research
has shown that the end-user is, more often than not, left out of the loop entirely when it comes to making decisions around new technology, which can create a significant amount of apathy. Consequently, end-users don’t truly buy into the device that they are given or don’t take it seriously, which can lead to issues surrounding a lack of care or consideration for the risks of not managing what is used or stored on the phone itself. Understanding how employees use mobile devices
Emails, calls, browsing and texts is the standard answer. However, when employees are emailing each other from their devices, have you ever stopped to consider what could be at stake? Unsecured document sharing, high data usage (particularly outside of the UK) and an unprotected handset are all potentially happening at the same time, exposing your business and commercially sensitive data to theft, bill shock and device hacking. All too often, businesses focus on the mobile device itself when they look at security measures. Your MDM solution more than likely only focuses on device-level management, such as the ability to set policies for password requirements, identity management, network enablement and app distribution on each device. They don’t see that a mobile device is the same as any other piece of IT equipment that can touch your network, but the truth is there are just as many risks in the network aspects as there are on the device. The risks of attaching devices to unknown networks
Logging on to WiFi sounds like a good way for your team to use their mobile devices remotely without using up mobile data. However, instead of focusing on the cost savings that allow your staff to do this, have you considered the costs of opening your technology to unknown networks and having potentially unencrypted communications being intercepted and used in unintended ways? Even encrypted data can still be obtained and then hacked into at a later date. Known as man in the middle attacks, they can cause unlimited damage to a business if they are able to intercept vital commercially sensitive data and use it to disrupt your business. This article hopefully reinforces known beliefs regarding mobile communications security and highlights that investment in the right communications technology can drive significant business transformation through increasing the productivity of staff, as well as giving them better tools to perform their roles. Chris Sharp is the financial director at Intercity Technology. Chris is a qualified chartered accountant who joined Intercity Technology in September 2011 after a successful six year career in practice with RSM Tenon. As finance director for Intercity Technology, Chris focuses on financial planning and forecasting to assist with business strategy. He has the ultimate responsibility for financial control and management reporting, which includes the overall control of financial transactions, monthly management reporting including operational KPIs, statutory reporting and taxation, and the management of insurance, banking and treasury relationships.
Share this story