Finance Ministry to offer eight T-bill, bond tenders worth EGP 190bn this week    US forces capture Maduro in "Midnight Hammer" raid; Trump pledges US governance of Venezuela    Gold slips at start of 2026 as thin liquidity triggers profit-taking: Gold Bullion    ETA begins receiving 2025 tax returns, announces expanded support measures    Port Said health facilities record 362,662 medical services throughout 2025    Madbouly inspects Luxor healthcare facilities as Universal Insurance expands in Upper Egypt    Nuclear shields and new recruits: France braces for a Europe without Washington    Cairo conducts intensive contacts to halt Yemen fighting as government forces seize key port    Gold prices in Egypt end 2025's final session lower    From Niche to National Asset: Inside the Egyptian Golf Federation's Institutional Rebirth    Egyptian pound edges lower against dollar in Wednesday's early trade    Oil to end 2025 with sharp losses    5th-century BC industrial hub, Roman burials discovered in Egypt's West Delta    Egyptian-Italian team uncovers ancient workshops, Roman cemetery in Western Nile Delta    Egypt to cover private healthcare costs under universal insurance scheme, says PM at New Giza University Hospital opening    Egypt completes restoration of 43 historical agreements, 13 maps for Foreign Ministry archive    Egypt, Viatris sign MoU to expand presidential mental health initiative    Egypt sends medical convoy, supplies to Sudan to support healthcare sector    Egypt's PM reviews rollout of second phase of universal health insurance scheme    Egypt sends 15th urgent aid convoy to Gaza in cooperation with Catholic Relief Services    Al-Sisi: Egypt seeks binding Nile agreement with Ethiopia    Egyptian-built dam in Tanzania is model for Nile cooperation, says Foreign Minister    Al-Sisi affirms support for Sudan's sovereignty and calls for accountability over conflict crimes    Egypt flags red lines, urges Sudan unity, civilian protection    Egypt unveils restored colossal statues of King Amenhotep III at Luxor mortuary temple    Egyptian Golf Federation appoints Stuart Clayton as technical director    4th Egyptian Women Summit kicks off with focus on STEM, AI    UNESCO adds Egyptian Koshari to intangible cultural heritage list    Egypt recovers two ancient artefacts from Belgium    Egypt, Saudi nuclear authorities sign MoU to boost cooperation on nuclear safety    Egypt warns of erratic Ethiopian dam operations after sharp swings in Blue Nile flows    Egypt golf team reclaims Arab standing with silver; Omar Hisham Talaat congratulates team    Sisi expands national support fund to include diplomats who died on duty    Egypt's PM reviews efforts to remove Nile River encroachments    Egypt resolves dispute between top African sports bodies ahead of 2027 African Games    Germany among EU's priciest labour markets – official data    Russia says it's in sync with US, China, Pakistan on Taliban    It's a bit frustrating to draw at home: Real Madrid keeper after Villarreal game    Shoukry reviews with Guterres Egypt's efforts to achieve SDGs, promote human rights    Sudan says countries must cooperate on vaccines    Johnson & Johnson: Second shot boosts antibodies and protection against COVID-19    Egypt to tax bloggers, YouTubers    Egypt's FM asserts importance of stability in Libya, holding elections as scheduled    We mustn't lose touch: Muller after Bayern win in Bundesliga    Egypt records 36 new deaths from Covid-19, highest since mid June    Egypt sells $3 bln US-dollar dominated eurobonds    Gamal Hanafy's ceramic exhibition at Gezira Arts Centre is a must go    Italian Institute Director Davide Scalmani presents activities of the Cairo Institute for ITALIANA.IT platform    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Security should be prime focus of businesses in Egypt, says expert
Published in Bikya Masr on 13 - 02 - 2012

CAIRO: Businesses in Egypt have seen a rapid proliferation of employee-owned mobile devices such as smartphones, tablets, and of course, laptops. Smartphone penetration in the Middle East region as a whole is already at 47 percent and is set to further rise to 70 percent by the end of 2016. Industry experts in their predictions on the top IT trends for the year have hailed 2012 to be the year of BYOD (Bring-Your-Own-Device) and enterprises are encouraging employees to embrace this trend.
Stephan Berner, managing director at help AG, a strategic information security consulting specialist in the Middle East, says that BYOD offers a number of benefits- the shift of operational expenses to the employee, with the worker bearing the cost of hardware, voice and data services and other related expenses; round the clock connectivity; and plain employee satisfaction. Also, given that the devices are not subject to slow upgrade cycles and infrastructure upgrade policies, they tend to be more cutting- edge allowing the enterprise to avail of the latest features and capabilities.
The problem enterprises face today is how to give their employees both flexibility and mobility, while securing the enterprise.
Be Malware Aware
One unwritten rule of malware is that when an operating system has reached 10 percent market penetration you will start seeing virus and malware being written for it. Smartphones and mobile devices are no different. Worldwide, the two big players in the market – Google's Android and Apple's iOS – are in a constant battle against threats. The Android system is by far the most heavily targeted. A report by Juniper Networks showed a 472 percent increase in Android malware samples since July 2011. This is largely due to the open nature of the Android marketplace which allows app developers to post apps to the marketplace without stringent application control. Thanks to tight regulation, the Apple App Store has been far more secure but there is always a possibility of malware being installed on a jailbroken Apple device since jailbreaking of the device bypasses Apple's software control.
BlackBerry devices which remain popular in the Middle East are almost untouched due to RIM's tight control around the APIs to the BlackBerry operating system. This control does however affect the openness of the platform negatively which is why the number of applications available for BlackBerry platform is rather limited as compared to iOS and Android.
While malware targeting mobile devices is undoubtedly on the rise, mobile malware should not be a top priority concern for most large businesses. Companies instead should lay emphasis on mobile device security. As workers now use more powerful mobile devices, companies need to be concerned with the physical security of mobile devices and about what mobile devices are downloading from their networks.
Addressing the Employee Factor
The employee still remains at the heart of discussion. Unmonitored access to information even in the form of a synched email account should be perceived as a security liability. What the IT department needs to address is a consistent way to manage personal devices. This includes formulating accepted guidelines for the use of BYOD in the workplace as well as educating employees on how to protect their devices from potential threats.
When addressing the issue of securing ‘prosumer' devices, those which assume both a professional and consumer role, enterprises need to answer the following questions- is there need for device encryption; who will implement endpoint security measures such as antiviruses; and will the organization have remote control over the device such as removing/installing applications, monitoring running applications, or even terminating an application in real-time.
With BYOD, information takes precedence- it is the organization's information that is the liablity and not the underlying hardware. Loss or the uncontrolled leakage of data can have a huge business impact. IT departments can employ safeguards such as placing a thin client with suitable authentication on a smart-phone. This can be configured to allow employees to connect to the corporate network while preventing the removal of data.
Another effective method of controlling data leakage and access to sensitive data on the device is sandboxing. This is possible through an application which when installed creates an encrypted area for data storage. This data can be shredded/ deleted if necessary and no other application can access this data area unless the corporate policy allows it.
It is also essential that IT department retains the ability to secure, control and remotely erase corporate data on employee-owned devices in the event of a security breach, if the employee leaves or the device is lost or stolen.
With the future of mobile computing advancing at a rapid pace, the increased use of high-tech personal devices at the workplace is only but inevitable. Organizations should recognize that BYOD is very much here to stay and should have policies in place to ensure that they are prepared. Most of all, the push for the adoption of enterprise mobility should not be driven by “what is possible” but instead by “what is possible in a SECURE way.”
BM
ShortURL: http://goo.gl/hTaaU
Tags: IT, Malware, Security, Tech
Section: Business, Egypt, Latest News, Tech


Clic here to read the story from its source.