My latest posting on NoJitter is now available:
- PilotHouse Vendor Rating
- Contact Center and Customer Engagement
- Cloud and Data Center
- Cost Models and Total Cost of Ownership
- Enterprise Trusted Advisor
- IT Innovation, Transformation, and Enterprise Technology
- Mobile and Network Services
- Security, Risk Management, and Compliance Research Initiatives
- Unified Communications and Collaboration
At last week’s Enghouse Interactive Analyst Event, I had a chance to get up close and personal with some of their contact center products.
Incoming CISOs like to joke that the first item they’re issued when they begin the new job is a T-shirt with a target on it.
Samsung Phone Vulnerability Illustrates Need For Enhanced Mobile Security
An exploit was recently demonstrated that leverages Samsung’s Android phone’s top features, including near field communications (NFC) and quick response (QR) codes to generate a hack that can reset all of the target device’s data. The hack uses these generally trusted technologies to create a link that bypasses the device’s secure dialer, executing everything from a complete wipe to displaying device ID information. The exploit has since been patched by Samsung, though other hacks that aren’t as easy to fix based on uniform resource locator (URL) embedded QR codes and NFC communications could still remain.
Seventy percent of enterprises support Android and 96% support iOS. However, only 46% of companies have deployed a mobile devices management (MDM) solution. As these mobile devices mature from consumer platforms into trusted enterprise devices, companies need to remain cautious and vigilant.
BTA Bottom Line:
While it’s unlikely an MDM would have caught this OS-specific error, building secure mobility infrastructure, including MDM, data leakage/loss prevention (DLP) and anti-virus/malware will allow a smoother, more secure transition into iOS and Android.