What to Do When Mobile and IoT Explode the Attack Surface

Source
Advertisement


Information security was hard enough when we had to lock down all of the servers, desktops and laptops. That seems like child’s play compared to what we face now. You could pretty easily count your server infrastructure and PCs were simply a function of your company employee count. Mobile and Internet of Things (IoT) change that equation as we outlined earlier this week in our new White Paper, Take Back Control of Your Information Security. I thought I’d cover part of the ground from that analysis and expand on a couple of concepts here.

Mobile and IoT are not only here to stay, they will only grow in scale and complexity over the next decade. This is one of the three most profound shifts facing information security defense to arise in the past five years (N.B. The other two are enterprise cloud adoption and growing emphasis on detection and response). While executives from the business side of the house have rushed headlong into mobile and IoT seeking greater efficiencies, they have been slow to recognize the new risks that these tools introduce.

Advertisement