The BYOD evolution demands that organisations need to properly control information. This has resulted in a greater focus on implementing management tools that provide IT executives with the control they need, says CHARLENE MUNILALL of Huawei.
With the whole bring-your-own-device (BYOD) debate largely settled through generally widespread adoption of the concept within the enterprise market, many organisations face the question: what now?
This can be a daunting prospect for companies not prepared for a world in which they have to accept that they have only nominal control over corporate information. The focus therefore needs to shift to what can be controlled, and what to do in the event that physical control is lost.
This latter scenario is one that exposes organisations to all manner of threats to the security of corporate information that extend well beyond passwords and financial data. Legislation like the Protection of Personal Information Act places increasingly onerous demands on companies to protect the information of customers and individuals.
What this calls for is the seemingly impossible task of knowing what information is contained on a device, where that device is at any given moment, and in whose possession it is.
The certainty that an IT executive would previously handover the security of information can be had if a suitably secure and reliable mobile device management (MDM) tool is used to administer the multitude of devices now used to access corporate information.
Both the functionality and security of these types of systems have matured with tremendous speed as BYOD has been more widely adopted.
So much so that enterprises have the same line of sight as if the device and information were contained within the enterprise network.
And largely because the leading MDM tools never allow the information to physically reside on the mobile device. This functionality has been facilitated by cloud-based services that provide ease of access without breaking the corporate network-mobile device barriers.
In instances where corporate information is stored on a device, the MDM should at the very least also provide a sandbox environment that provides a clear separation between corporate and personal information.
To ensure true peace of mind, however, requires that any connections to the enterprise system is sufficiently encrypted to provide the necessary levels of security. In addition, such connections should be secured with protection against viruses and the legion of vulnerabilities that corporate networks are subjected to.
Leading MDM tools come to the fore in protecting companies in the unfortunate eventuality of a device being lost or compromised.
While remote access and wiping of critical information is at the forefront of this type of functionality, geolocation services is as important in apprehending culprits or at the very least recovering lost or stolen devices.
With these types of tools and functionality readily available from leading vendors such as Huawei, IT executives have a greater degree of certainty over the security of their information in this era of constant mobility and demand for access at all times, from anywhere.
* Charlene Munilall, General Manager, Huawei Consumer Business Group, South Africa
Revealing the real cost of ‘free’ online services
A free service by Finnish cybersecurity provider F-Secure reveals the real cost of using “free” services by Google, Apple, Facebook, and Amazon, among others.
What do Google, Facebook, and Amazon have in common? Privacy and identity scandals. From Cambridge Analytica to Google’s vulnerability in Google+, the amount of personal data sitting on these platforms is enormous.
Cybersecurity provider F-Secure has released a free online tool that helps expose the true cost of using some of the web’s most popular free services. And that cost is the abundance of data that has been collected about users by Google, Apple, Facebook, Amazon Alexa, Twitter, and Snapchat. The good news is that you can take back your data “gold”.
F-Secure Data Discovery Portal sends users directly to the often hard-to-locate resources provided by each of these tech giants that allow users to review their data, securely and privately.
“What you do with the data collection is entirely between you and the service,” says Erka Koivunen, F-Secure Chief Information Security Officer. “We don’t see – and don’t want to see – your settings or your data. Our only goal is to help you find out how much of your information is out there.”
More than half of adult Facebook users, 54%, adjusted how they use the site in the wake of the scandal that revealed Cambridge Analytica had collected data without users’ permission.* But the biggest social network in the world continues to grow, reporting 2.3 billion monthly users at the end of 2018.**
“You often hear, ‘if you’re not paying, you’re the product.’ But your data is an asset to any company, whether you’re paying for a product or not,” says Koivunen. “Data enables tech companies to sell billions in ads and products, building some of the biggest businesses in the history of money.”
F-Secure is offering the tool as part of the company’s growing focus on identity protection that secures consumers before, during, and after data breaches. By spreading awareness of the potential costs of these “free” services, the Data Discovery Portal aims to make users aware that securing their data and identity is more important than ever.
A recent F-Secure survey found that 54% of internet users over 25 worry about someone hacking into their social media accounts.*** Data is only as secure as the networks of the companies that collect it, and the passwords and tactics used to protect our accounts. While the settings these sites offer are useful, they cannot eliminate the collection of data.
Koivunen says: “While consumers effectively volunteer this information, they should know the privacy and security implications of building accounts that hold more potential insight about our identities than we could possibly share with our family. All of that information could be available to a hacker through a breach or an account takeover.”
However, there is no silver bullet for users when it comes to permanently locking down security or hiding it from the services they choose to use.
“Default privacy settings are typically quite loose, whether you’re using a social network, apps, browsers or any service,” says Koivunen. “Review your settings now, if you haven’t already, and periodically afterwards. And no matter what you can do, nothing stops these companies from knowing what you’re doing when you’re logged into their services.”
***Source: F-Secure Identity Protection Consumer (B2C) Survey, May 2019, conducted in cooperation with survey partner Toluna, 9 countries (USA, UK, Germany, Switzerland, The Netherlands, Brazil, Finland, Sweden, and Japan), 400 respondents per country = 3600 respondents (+25years)
WhatsApp comes to KaiOS
By the end of September, WhatsApp will be pre-installed on all phones running the KaiOS operating system, which turns feature phones into smart phones. The announcement was made yesterday by KaiOS Technologies, maker of the KaiOS mobile operating system for smart feature phones, and Facebook. WhatsApp is also available for download in the KaiStore, on both 512MB and 256MB RAM devices.
“KaiOS has been a critical partner in helping us bring private messaging to smart feature phones around the world,” said Matt Idema, COO of WhatsApp. “Providing WhatsApp on KaiOS helps bridge the digital gap to connect friends and family in a simple, reliable and secure way.”
WhatsApp is a messaging tool used by more than 1.5 billion people worldwide who need a simple, reliable and secure way to communicate with friends and family. Users can use calling and messaging capabilities with end-to-end encryption that keeps correspondence private and secure.
WhatsApp was first launched on the KaiOS-powered JioPhone in India in September of 2018. Now, with the broad release, the app is expected to reach millions of new users across Africa, Europe, North America, Southeast Asia, and Latin America.
“We’re thrilled to bring WhatsApp to the KaiOS platform and extend such an important means of communication to a brand new demographic,” said Sebastien Codeville, CEO of KaiOS Technologies. “We strive to make the internet and digital services accessible for everyone and offering WhatsApp on affordable smart feature phones is a giant leap towards this goal. We can’t wait to see the next billion users connect in meaningful ways with their loved ones, communities, and others across the globe.”
KaiOS-powered smart feature phones are a new category of mobile devices that combine the affordability of a feature phone with the essential features of a smartphone. They meet a growing demand for affordable devices from people living across Africa – and other emerging markets – who are not currently online.
WhatsApp is now available for download from KaiStore, an app store specifically designed for KaiOS-powered devices and home to the world’s most popular apps, including the Google Assistant, YouTube, Facebook, Google Maps and Twitter. Apps in the KaiStore are customised to minimise data usage and maximise user experience for smart feature phone users.
KaiOS currently powers more than 100 million devices shipped worldwide, in over 100 countries. The platform enables a new category of devices that require limited memory, while still offering a rich user experience.
* For more details, visit: Meet The Devices That Are Powered by KaiOS
* Also read Arthur Goldstuck’s story, Smart feature phones spell KaiOS