Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

A New Role in IT – The Mobile Strategist

Today, the average number of mobile apps accessed daily is more than double the average number of times an employee logs into legacy systems each day. Clearly, mobile adoption in the enterprise is not plateauing any time soon, nor is the threat associated with mobile.

Today, the average number of mobile apps accessed daily is more than double the average number of times an employee logs into legacy systems each day. Clearly, mobile adoption in the enterprise is not plateauing any time soon, nor is the threat associated with mobile.

As a wide variety of mobile devices and applications continue to infiltrate the enterprise, organizations have been forced to rethink their approach to security. The issue is so great that many organizations are creating a new role to deal with the era of mobile. Dubbed the mobile strategist, this person is tasked with advising and guiding their company through the overwhelmingly popular BYOD trend with a security strategy in mind. A recent survey (PDF) found that 75 percent of companies have created some type of “mobile strategist” role to support mobile efforts, further demonstrating how this role is quickly becoming an integral part of IT and security teams.

Mobile StrategistWith 68 percent of organizations having already experienced security breaches as a result of a compromised mobile device, this new role will play a crucial part in mobile data security. The mobile strategist must consider not only how to implement BYO devices and applications in the enterprise, but how to do so in a secure fashion. It’s vital that the mobile strategist maintain visibility throughout the entire organization, considering user experience, mobility, technology integration and security at every step.

This can be a daunting task, especially in the BYOD era, as the mobile strategist is entirely responsible for unifying mobile, securing the data and the meeting end-user productivity needs. One of the biggest challenges for mobile strategists will be replacing first generation technologies that were bought ad-hoc, with new technologies that can meet security protocols and end-user needs. Additionally, mobile teams will have a much harder time adapting to changing technology, as the user is far more involved in a BYOD enterprise and is essentially in control of their device.

Mobile strategists should prioritize the data over the device, drastically shifting how mobile in the enterprise is approached. Devices are constantly changing and BYOD now puts security in the hands of users that unknowingly put corporate data at risk.

Mobile teams need to deploy a device-agnostic strategy that focuses on business processes and apps used in the enterprise. In an ever-changing mobile landscape, teams must get above the device and incorporate security into the user workflows from day one.

Mobility is maturing quickly and companies are developing more internal mobile applications and moving processes from laptops to mobile devices. As a result, we will continue to see not only the emergence of, but also the growing relevance of, the mobile strategist within organizations of all sizes. While this role will continue to evolve, forward-looking companies that have already adopted a mobile strategist will be best equipped to manage the ever-changing mobile landscape. The mobile strategist will play a pivotal role in mobile integration, as they pave the way for the organizations to do so purposefully and securely.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.