Surge in mobile cyber-crime predicted with 4G rollout

0
402

Security firm Voltage warns the introduction of faster networks will dramatically increase the need to protect data 

The introduction of 4G could leave businesses wide open to cyber-criminals unless they take appropriate security measures.

This is according to data-centric security firm Voltage Security, which warned that a drop in enterprises allowing BYOD, coupled with a new mobile enterprise era rung in by the introduction of 4G, could lead to this surge in mobile cyber-crime.

Voltage has predicted that with the growing popularity of BYOD, it’s even more critical for enterprises to think beyond just protecting the device. It warned that attackers want the data, so that’s where the protection needs to be and with faster networks, more sensitive data will be shared across mobile channels.

The security experts said there are three types of mobile data that are most at risk from cyber criminals: email communication containing sensitive information; sensitive business data and files; and transaction data captured by mobile payment methods.

It said that with smartphones and fast networks integrating the consumer into business through data, managing the use of that data to improve customer service must be balanced with breach risk and regulatory compliance.

Voltage Security VP of product management Mark Bower said: “The predicted increase in enterprises allowing their employees to make the leap and use their own device to get on to work networks can only be expected to grow further with the arrival of these new, superfast services. Mobile enterprises are highly insecure territory. The problem is that the cyber-criminals tend to follow the people – and the data they work with.

“The change to 4G is rather like a change from a tranquil country road to a four-lane highway, bringing a whole new level of potential – and risk. Employees can – and will – use these services for work but organisations are not yet ready for the rush.

“Mobile devices aren’t going away and traditional security approaches – such as firewalls and smart screen filters – lock down the infrastructure, but that is not the target for today’s cybercriminals. They want sensitive data, which is valuable, easily monetised and increasingly on the move. And they fully understand where and when to find ‘data in the clear’, when it is most vulnerable – and they’re willing to wait.

“But waiting is one thing you can’t afford to do. Data is key and a data-centric approach to mobile security with encryption will mitigate the risk of data breaches and other threats so the new mobility we are experiencing can be leveraged to its fullest potential.”

NO COMMENTS

LEAVE A REPLY