NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
October 14, 2016

Mobile security: Cybersecurity awareness month

NuHarbor Security

If the last blog post didn’t resonate with you, this post about mobile security is sure to do so! All smart phone users or businesses permitting BYOD (bring-your-own device) should pay attention.

According to an IBM study, 99% of the enterprise workforce currently uses mobile devices to perform their jobs; this includes smartphones, tablets and laptops. NINETY-NINE PERCENT! Further highlighting the importance of mobile security, the same study tells us that nearly 60% of security leaders describe their organizations as either partially or fully mobile. A 2016 Spotlight Report estimates that roughly 40% of organizations have made BYOD available to all employees and 9% plan to offer it in the next 12 months. So what does this mean? Companies have found that employee mobility and flexibility, tech cost reduction, and increased productivity are all benefits of BYOD, but are there implications of this unique IT business model?

Mobile Security & Potential Data Leakage

Of the various BYOD security concerns, data loss and increased data leakage sits at the top. Security leaders, CIOs and other IT decision makers are haunted by mobile app downloads and external wireless connectivity as it exists outside organizational security protocol. In fact, an HP study explains that 86% of these mobile apps lacked basic security protection which provides a gateway for hackers and could easily lead to malicious activity on the business functionalities of your mobile device. Because you host both personal and business data on your smartphone or tablet, you may have unintentionally exposed private data and this leads to yet another security issue!

User Carelessness (Unintentional)

It is highly likely that your attention to security detail does not change simply because you hold business data on your own mobile device – users don’t reflect on the consequences of deficient security hygiene. A cringing moment… up until the most recent smartphone updates, there was no password requirement which poses a significant problem on lost or stolen devices. A nickel’s worth of advice: Invest in Enterprise Mobility Management; this set of systems allows IT and security managers to monitor mobile devices and prevent unauthorized access to enterprise applications and company data.

Requires Additional Resources

In an attempt to prevent complications related to the first two issues, companies are obligated to spend more money to protect mobile hosted enterprise data. Regulatory fines are also a negative consequence relating to mobile threats and now organizations are forced to modify the overall infrastructure to meet the security demands of the mobile workforce. The 2016 Spotlight Report claims that 35% additional IT resources will be required to manage their mobile security programs. These costs are pinpointed at increased workload, malware and data loss – what a surprise…

Despite the fact that companies must spend more money to protect mobile hosted enterprise data, the additional resources spent are well worth the security protection. A prominent healthcare organization, Oregon Health & Science University (OHSU), recently reached a $2.7 million settlement for potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) after an investigation by the U.S. Department of Health and Human Services Office for Civil Rights (OCR) uncovered critical security errors at OHSU, according to the U.S. Department of Health and Human Services. OHSU suffered multiple data breaches that put thousands of individuals’ personal information at risk. The major reason for these breaches was due to OHSU’s violation of HIPAA compliance by storing the electronic protected health information (ePHI) of over 3,000 individuals on a cloud-based server without a business associate agreement. The case of OHSU should be a warning to all organizations that security vulnerabilities must be remediated, especially with cloud-based servers and mobile hosted enterprise data.

As we continue our series of posts on security awareness, NuHarbor hopes to enlighten our readers with security best practices and industry advice on the different areas of vulnerability. Stay tuned for our next post!

Included Topics

  • Industry Insights

Related Posts

Compliance 5 min read
10 Steps to Starting a HIPAA Gap Analysis Read More
Security Operations 3 min read
4 Ways to prevent data breaches in the retail industry Read More
Industry Insights 2 min read
National cybersecurity awareness month 2016: Threats to watch Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.