Dell warns firms not to get complacent over mobile security

Businesses need to focus on managing apps, not devices, says CTO

Managing data and applications on mobile devices should be a priority for IT admins, according to Dell.

Businesses need to focus on the software side of things, not just the hardware it is running on, Don Ferguson, VP and CTO for software at Dell told delegates during a panel discussion.

"Poorly designed software is the main reason for security breaches. Step one [for protection] is to make sure you have proper expertise for developing software," he said at Dell World 2014.

"Mobile device security touches everything from data classification [to] privileges. It's important to secure the device and ensure that only the right people retain rights to the data."

Meanwhile, Prasad Thrikutam, president and global head of applications at Dell Services warned businesses not to get complacent as the sophistication of mobile devices increases.

"There are at least 368 security major breaches to the end of October10 million records have been compromised," he said.

"There are so many windows of vulnerability [on mobiles]. Just the aspect of GPS on phones exposes them. Advertisers can know your position and [hackers can] get into the back end. Most of us use simple, easy to remember, one-finger security codes that makes them easy to access [too]."

Thrikutam's advice is for businesses to implement platform-based security, adopt two-factor authentication, use containers to sandbox data/apps and also direct attention to securing back-end infrastructure.

Featured Resources

Security analytics for your multi-cloud deployments

IBM Security QRadar SIEM solution brief

Download now

Five reasons to move to the cloud

Join the enterprises moving their workloads to the cloud

Download now

Architecting hybrid IT and edge for digital advantage

Why business leaders should consider a hybrid IT strategy

Download now

Six reasons to accelerate remote asset monitoring with AI

How to optimise resources, increase productivity, and grow profit margins with AI

Download now

Recommended

Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021
CISA warns of ongoing Accellion File Transfer Appliance attacks
hacking

CISA warns of ongoing Accellion File Transfer Appliance attacks

25 Feb 2021
What is a Trojan?
Security

What is a Trojan?

25 Feb 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

26 Feb 2021