Wireless Security: What Happened to: “If It Isn’t Broken”
Security organizations report that since the beginning of this year, over 400 significant security breaches have occurred, compromising the confidential information of millions individuals. Despite the overwhelming objections of Information Technology (IT) and Corporate Security personnel, many companies decided to institute the Bring Your Own Device (BYOD) model. Many of those companies now have regrets and are paying a hefty monetary price for making that decision.
Red Flags went-up immediately. For example: Symantec referred to the Android as a Malware Magnet. Then, in April of this year, Fiberlink reported the results of a study finding that 83% of BYOD users had installed between 10 and 100 applications on their devices. These findings demand a few questions:
- How many of these applications have been tested and approved by corporate security?
- Are these applications compatible with the employer’s systems?
- Do any of these application utilize advertising associated with a third party?
The answers to these questions should be obvious. The model is significantly flawed and security breaches continue to occur in epidemic proportions.
What next? How about the Corporate Owned Personally Enabled (COPE) model. Unfortunately, COPE brings its own set of problems. Even though the company owns the device, employees resent corporate intervention and control. Since we are a resourceful society, it should come as no surprise that users have determined a way to circumvent security guidelines, resulting in the same vulnerabilities associated with the BYOD model.
The primary truth emerging from countless security and IT studies is this: there is no way to fully protect corporate data without full corporate control. Corporate complacency can no longer be tolerated. Ultimately companies must ask themselves: Is the money they believe they would save by implementing either the BYOD or COPE model really worth the risk? What about the sensitive information associated with the innocent citizens they are bound to protect? The ingenuity, intelligence and malicious intent of hackers cannot be overstated. Their sophisticated and difficult to detect methods result in serious security breaches every day. That’s why we recommend that companies pick their battle and manage what they can.
There is a simple two step plan to be fiscally responsible and maintain the security and confidentiality of corporate data:
- Return to the corporate owned and controlled wireless model
- Engage a wireless fee management team
These professionals bring a wealth of experience in wireless/cellular technology, which enables them to productively utilize their substantial leverage with wireless providers. By employing innovative pooling techniques and negotiating strategies in conjunction with their access to unpublished pricing and discount data, they have saved many companies hundreds-of-thousands of dollars. They are so confident in their ability to obtain savings for their clients that they work on a contingency billing model…so they are paid only if and when positive results are achieved. It’s a painless process that can keep companies compliant from a security perspective and conscientious regarding costs. Companies are able to:
- Keep current carrier
- Keep existing contract
- Use existing equipment
- Avoid costly software fees
- Receive bill directly from their carrier
- Recover credits for billing errors, overcharging, and carrier negligence
Moving forward without addressing cellular security is inexcusable. This article has armed you with the best and latest information in the industry. The next step is up to you. Let it set you on a cost-effective path to security. You owe it to yourself, your company, and your clients.