As organizations seek to impose greater order on the mobile activities that affect their operations, challenging but important questions come into play. Thinking through the questions and determining the right procedures and technologies to address them can help organizations shape plans to become more secure, more vigilant, and more resilient in the face of cyber threats.
Know the problems you are seeking to solve. Problems on the mobile front can take many forms. For example, are you trying to address workers' concerns as you push them to use corporate apps on devices besides their company-issued phones? Or are you attempting to understand threats to your organization while taking a "bring your own device" (BYOD) approach that lets workers decide which of their own mobile tools they use to do their jobs? Knowing and defining the problem provides you with a starting point to a resolution.
Have a plan for securing the development of mobile apps. Creating corporate apps to help workers perform their jobs is a smart step, but the process for developing, testing, and deploying those apps should ensure that you're not introducing new vulnerabilities.
Determine which personal mobile devices workers can use to do their jobs, and which corporate devices they can use to access specific information resources. Not all devices are created equal. For certain operations, some devices—whether employees' or corporate-owned devices—simply might not be a good fit for your mobile security plan.
Decide what kind of apps workers can use. Installing certain apps on specific devices could present vulnerabilities when it comes to privacy or data leakage. Some apps simply might not fit well with your organization's security plan.
Understand the ramifications when a "stranger" (whether a thief or an employee's family acquaintance) takes, loses, or compromises a mobile device. And decide how you will react. With some solutions, remote wiping of data can offer a solution to loss or theft of a device. But are you prepared to remotely wipe a device with an employee's personal photos on it? Do employees know when remote-wiping can occur? Thinking through questions like these will help your organization respond prudently on the security front, while also allowing you to better manage worker expectations.
Decide on the access or app downloading restrictions you will impose as part of a plan to prevent malware. Unbridled mobile access to apps and corporate information poses obvious security risks so your organization should have a clear plan that covers what's specifically restricted and how you will enforce those restrictions.
Know how you will interact with contractors, partners, and friends on the mobile front. Suppliers and vendors are using mobile too as they do business with your organization. Understand how they are accessing your information and systems. And consider how guests visiting your offices may access your systems. What devices can they bring? What resources can they access? Planning for a multitude of scenarios that involve partners and mobile tools can help you get ahead of mobile security problems before they arise.
Comprehensively address security challenges that may arise as you support more than one mobile platform for your workforce. Many organizations address security issues for iOS, Android, and Blackberry on an ad-hoc basis as new offerings crop up in the hands of their workers. A more focused and comprehensive approach to security can help address platform-associated challenges ahead of time.