Quantcast
Viewing all articles
Browse latest Browse all 3

Cloud Security – The Danger is in the Devices

Mobility allows the organization to be more productive because one can easily access the data from anywhere at any time, mobile technologies are also known as portable technologies and it is not just restricted to mobile phone but it also includes laptops, tablets.

Although mobile devices are helpful as they allow us to access the data from any corner of the world at anytime, but there is some limitation attached to the use of mobile devices. Mobile devices are vulnerable to lots of threats; mobile devices can expose the organization data to unauthorized uses make the organization data expose to the unauthorized uses through mobile technology if proper safety measures are not taken.

There are various threats associated with the mobile devices.

  • Sensitive data of the organization can be lost (compromised) from the lost or stolen devices, if one loses the device then the application on the device which is connected through the cloud is also lost. It simply means that any data that is accessed through the device can be subjected to theft or lost if the device is lost for example if somebody loses the mobile device then even the password for the device can be used and this can result in the breach of security which is the biggest concern for the organization .
  • Mobile devices are easily subjected to virus attack and hacking this is because the operating system in these mobile devices are not safe as we have on the computer, therefore it always makes it easier for viruses or hackers to attack the devices, but the laptop is an exception to this because in laptops there is a good operating system with antivirus software installed in it.
  • Unsecured Wi-Fi is also one of the major threats associated with mobile devices an unsecured Wi-Fi allows the mobile devices to get connected with a stranger somewhere nearby, many users are increasingly using Wi-Fi in the public to access data through their mobile devices which makes the devices as well as the critical business data vulnerable to attack or theft. Increasing use of public or unsecured Wi-Fi can allow anyone to easily access the data through unsecured Wi-Fi.
  • NCF and proximity based hacking: NCF stands for near field communication, which allows all the mobile devices to communicate with each other in a short range now this technology can make the sensitive data easily accessible to any unauthorized user near the range.

However with all these dangers associated with the mobile devices we just cannot ignore how these devices are increasing the efficiency of the business, if proper measures are taken then these devices will be very useful for the business.

How to secure the mobile devices in the cloud:

  • Before adopting any cloud-based services one should have proper knowledge about the cloud security and how the secure information will be sent across be it a private or public cloud.
  • Restrict the use of the mobile devices for the sensitive information.
  • Always use high encryption to minimize the mobile security vulnerabilities.
  • Create good security policies which are specific to mobile devices.
  • Use a  suitable antivirus software.

Cloud computing is a new technology and brings with it the inherent uncertainties related to security. That doesn’t mean the tried and tested methods of security regulation don’t apply here too. Proceed with caution for the best benefits, that is what we recommend.


Viewing all articles
Browse latest Browse all 3

Trending Articles