Don't let mobile threats derail BYOD efforts
April 10, 2013
Business construction software is designed to help decision makers and executives work together on projects on their smartphones and tablets. The Android operating system is one of the most popular in the United States with a wide range of devices that can carry out nearly every business process. However, firms need to stay abreast of potential malware issues that can put critical business information at risk.
Data security concerns are always going to linger when construction firms are enabling "bring your own device" policies. To truly maximize the potential of such deployment, it's important for firms to beef up their layers of protection. During a recent conversation with Biztech magazine, Dionisio Zumerle, principal research analyst at Gartner, said businesses have no choice but to make mobile security a higher priority when using BYOD.
"Shifting from an enterprise-owned mobile device fleet to having employees bringing their own devices has a major impact on the way of thinking and acting about mobile security," Zumerle told the magazine. "Policies and tools initially put in place to deal with mobile devices offering consumer-grade security must be revised to deal with these devices being under the ultimate control of a private user, rather than the organization."
Mobile malware continues to pop up
Construction companies should never feel as though they are completely safe from mobile malware threats, as hackers are constantly coming up with new ways to infiltrate the security layers used by the firms. With a strong mobile device management strategy in place, businesses can only hope they won't be subject to another mobile malware attack.
What to look out for
Antivirus software provider Bitdefender recently took a deeper look into mobile malware threats and evaluated what may be the telltale signs that the Android devices of some construction executives may be infected. The list below outlined what firms should look out for to see if they may be the victim of a threat:
- Data usage begins to skyrocket as the malware will be sending in or out information
- The battery on the device will drain because e-threats are being added to the phone
- Performance will be begin to suffer as the memory has been victimized with malware