Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

A New Role in IT – The Mobile Strategist

Today, the average number of mobile apps accessed daily is more than double the average number of times an employee logs into legacy systems each day. Clearly, mobile adoption in the enterprise is not plateauing any time soon, nor is the threat associated with mobile.

Today, the average number of mobile apps accessed daily is more than double the average number of times an employee logs into legacy systems each day. Clearly, mobile adoption in the enterprise is not plateauing any time soon, nor is the threat associated with mobile.

As a wide variety of mobile devices and applications continue to infiltrate the enterprise, organizations have been forced to rethink their approach to security. The issue is so great that many organizations are creating a new role to deal with the era of mobile. Dubbed the mobile strategist, this person is tasked with advising and guiding their company through the overwhelmingly popular BYOD trend with a security strategy in mind. A recent survey (PDF) found that 75 percent of companies have created some type of “mobile strategist” role to support mobile efforts, further demonstrating how this role is quickly becoming an integral part of IT and security teams.

Mobile StrategistWith 68 percent of organizations having already experienced security breaches as a result of a compromised mobile device, this new role will play a crucial part in mobile data security. The mobile strategist must consider not only how to implement BYO devices and applications in the enterprise, but how to do so in a secure fashion. It’s vital that the mobile strategist maintain visibility throughout the entire organization, considering user experience, mobility, technology integration and security at every step.

This can be a daunting task, especially in the BYOD era, as the mobile strategist is entirely responsible for unifying mobile, securing the data and the meeting end-user productivity needs. One of the biggest challenges for mobile strategists will be replacing first generation technologies that were bought ad-hoc, with new technologies that can meet security protocols and end-user needs. Additionally, mobile teams will have a much harder time adapting to changing technology, as the user is far more involved in a BYOD enterprise and is essentially in control of their device.

Mobile strategists should prioritize the data over the device, drastically shifting how mobile in the enterprise is approached. Devices are constantly changing and BYOD now puts security in the hands of users that unknowingly put corporate data at risk.

Mobile teams need to deploy a device-agnostic strategy that focuses on business processes and apps used in the enterprise. In an ever-changing mobile landscape, teams must get above the device and incorporate security into the user workflows from day one.

Mobility is maturing quickly and companies are developing more internal mobile applications and moving processes from laptops to mobile devices. As a result, we will continue to see not only the emergence of, but also the growing relevance of, the mobile strategist within organizations of all sizes. While this role will continue to evolve, forward-looking companies that have already adopted a mobile strategist will be best equipped to manage the ever-changing mobile landscape. The mobile strategist will play a pivotal role in mobile integration, as they pave the way for the organizations to do so purposefully and securely.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Mobile & Wireless

The February 2023 security updates for Android patch 40 vulnerabilities, including multiple high-severity escalation of privilege bugs.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

South Dakota Gov. Kristi Noem says her personal cell phone was hacked and linked it to the release of documents by the January 6...