Offloading threatens digital security – Gadget

The work from anywhere (WFA) model has grown significantly in South Africa in recent weeks as load shedding forces remote workers to seek power from a multitude of sources, in malls and cafes, meaning they can switch between mobile phones, tablets and laptops on any number of potentially unsecured public Wi-Fi hotspots. This mobility increases the cybersecurity risks presented by all these often poorly secured devices, initially.

Smartphones, in particular, have become an essential part of the remote workforce’s toolkit. They are such an integral part of every person’s daily routine that people can consider them reliable and safe. As a conduit to your personal data, banking and accounts, and as a link to your work and business data, smartphones drive cybercriminals right into your pocket. As such, they could become the next big vector for diversion and weaponization in the distribution of attacks.

Mobile cybersecurity threats primarily align with common threats, including phishing and malware, but can also include mobile-specific issues such as app-based threats and device-based and mobile-based exploits. Operating systems. Verizon’s 2021 Mobile Security Index found that while 71% of businesses view mobile devices as critical to their business, 40% also view them as their company’s biggest security risk and 53% reported the consequences they face due to security related to mobile devices. compromises were major. Additionally, the survey found that 93% of Android devices were running an outdated version of the operating system, and 49% of workers allowed family or friends to use their work devices.

Securing Mobile Devices

As the endpoint of the corporate network, the mobile device must be secured with PIN codes, passwords and even strong biometric identifiers such as facial recognition and fingerprint readers. Multi-factor authentication is an authentication method that protects individuals and organizations by requiring users to provide two or more authentication factors to access an application, account, or virtual private network (VPN). This adds additional layers of security to combat more sophisticated cyberattacks, even after credentials or identities have been stolen, exposed, or sold by third parties.

And as a key part of the work from anywhere (WFA) strategy, mobile devices must also be protected in a Zero Trust model, which states that trust must be explicitly derived from a mix of aspects based on identity and context. Additionally, Trustless Network Access (ZTNA) provides per-user access to specific applications, far exceeding implicit trust in security. Every device, user and application can be seen and controlled, regardless of where they connect from. Implementing a zero-trust model provided by ZTNA ensures that whenever a user or device requests access to a resource, it is verified before access is granted. By unifying Fortinet’s broad portfolio of zero-trust, endpoint, and network security solutions within the Fortinet Security Fabric, Fortinet delivers security, services, and threat intelligence that seamlessly follows users, whether they on the go, at home or in the office, to provide businesses with quality protection and productivity. These capabilities are designed for how business is done in the age of work from anywhere.

Sylvia B. Polson