The week of Mobile Security!!


Do you know how mobile devices affect your network security? The boundary of enterprise security doesn't end with your organization’s perimeter. You might have improved your defense mechanism against direct attacks on your network, but mobile devices can still be a potential threat, unless the endpoints are secured.


mobile devices.PNG


Threats are now Mobile!!

Over the last few years, we have seen a big bump in the number of mobile devices plugged onto the organization networks. Now imagine a situation, where your user downloads a vulnerable application on his smartphone, there are chances that the user might have unknowingly installed a malware – wouldn’t your data be walking out of your doors, right in front of you?


The Mobile Security Week of NCSAM, gives you an opportunity to revisit and manage the mobile application and device risks and restrict their access to trusted networks.


It’s time to revisit your:

  • Data securing mechanism
  • Wi-Fi access points
  • User logons
  • BYOD policies


To defend your network at this level, here are some key areas that you need to focus on:

  1. Monitor network connected devices and identify unauthorized ones
  2. Unusual access patterns or after-work network activity can be a sign of corporate espionage or sabotage in progress – particularly if your system is logging higher-than-average login attempts on sensitive financial or R&D areas of the network.
  3. Tracking LAN traffic can help pinpoint the malware introduced by BYOD devices, based on how it tries to access other ports or network hosts
  4. Monitor all the event logs on your network continuously for anomalous, unusual or non compliant activities.
  5. You need to be alerted on issues in real-time, so it is ideal that you use an SIEM tool that uses in-memory correlation to send you notifications on anomalies and triggers action based on the set thresholds per event or a group of events.

Check out our Week 2: Being Mobile section on our all new NCSAM page to learn more.