Computer Networks Questions “How Secure Are Your Company’s Mobile Devices?”

Share Article

With the likely hood of mobile security threats to double by end of 2011, Computer Networks (CN) is warning businesses not to leave their organisation vulnerable to security breaches.

News Image
In times of cyber-attacks and security breaches businesses need to make sure that they don’t cripple their organisation in the rush to stay relevant.

With the deluge of mobile devices, operating systems and applications hitting the market, Computer Networks (CN) is warning businesses not to leave their organisation vulnerable to security breaches. CN asserts that more and more businesses are struggling with enterprise security and control when it comes to company smartphones, tablets, laptops and other mobile devices.

A recent IBM Study article suggests mobile security threats to double by end of 2011.

Computer Networks CEO, Brian Pereira, stated that:
“In times of cyber-attacks and security breaches businesses need to make sure that they don’t cripple their organisation in the rush to stay relevant.”

CN argues that businesses are failing to find the balance between being innovative, fast adopters of technology and ensuring that their valuable company data is protected.

“While businesses are keen to allow easy access to new technology that will speed up and empower them to create value, serve customers and improve their results, most are not ensuring that their intellectual property is protected,” said Pereira.

CN warns companies not to leave their organisation vulnerable and that all businesses, no matter how large or small, should have an enterprise device management strategy.

“The solution is simple - Mobile Device Management. Businesses should look for software products that offer extensive options for security and control, centralised device management, worry free software updates, roll outs and fixes delivered centrally. Software with bandwidth optimisation that is device agnostic and can be purchased on a per user, per device, per month basis,” said Pereira.

They contend that security policies should be centrally managed and deployed, and that data should be encrypted to a standard that is effective for the operating environment. CN’s stance is that the enterprise should be able to easily control and encrypt the use of company and proprietary data, applications and other sensitive materials; a cloud based solution.

“In times where technology and advances in solution architecture allows flexible deployment models, the ideal solution should be available in a pay per device or pay per user model allowing organisations to use what they need, when they need it, said Pereira.”

About Computer Networks
Computer Networks is the technology infrastructure and hosting division of The CN Group of Companies, a privately owned Australian IT support and services company. Computer Networks offers dynamic IT consultancy tailored to the needs of small and medium enterprises through intelligent, innovative and proactive IT solutions. For more information please visit http://www.computernetworksit.com.au or call 1300 88 66 76.

###

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Brian Pereira

Released by:
Visit website