©2011 CenturyLink, Inc. All Rights Reserved.Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. WP101111 08/11
Until the last ew years, the BlackBerry, with its robustnative security eatures, was the de acto standard orcorporate use. Today, your users may be just as likelyto use Apple iPhones and Google OS-based Androiddevices—both or business and personal use.“The majority o malware right now is being developedor Android-based mobile devices, with the second mostpopular being iOS devices,” Brecl said, although Apple’smore rigorous application approval process provides abit more o a barrier. “But at the end o the day, largebusinesses don’t care about the device itsel. Even a $500handset is immaterial compared with the value o the datastored on it i it gets in the wrong hands.”Protecting the data users access, store and share viamobile devices requires a combination o security solutionsand user policies. Brecl recommends these our steps toprotect data on mobile devices:1. Tightly control what can be installed on mobiledevices.2. Install anti-virus and anti-spam on every device.3. Detect and prevent installation o known malware.4. Protect data on lost or stolen devices:
Enorce use o security PINs to control access.
Encrypt sensitive or proprietary data.
Use management capabilities to “remote wipe” data.
Social media: preying on trust
Social media has evolved to become a vital part o yourbusiness toolkit. Sure, employees are checking Facebookon their lunch break, but they’re also using social tools toanswer customer support calls, collaborate with colleaguesand partners, and seek user input or new productinnovations.
60% o employees use social media or personalreasons at least 30 minutes per day.
42% spend that much time on social media orbusiness purposes.
52% o organizations experienced an increase inmalware attacks as a result o employees’ use osocial media.
29% say they have the necessary security controlsin place to mitigate or reduce the risk posed bysocial media used in the workorce.
Source: Ponemon Institute
In addition to external social networks, your company’semployees may share links on internal platorms such asSalesorce Chatter or an instant messaging application. “II send you a link, you’re going to click on it because it’s romme—someone you trust. In the case o social networks, thebad guys count on being able to compromise someone’saccount and then utilize that trust to get you to click,”Brecl said.Even i a link really does come rom a trusted riend orcolleague, it doesn’t mean the content is sae. In act,it’s estimated that about 80% o websites inected withmalicious code are actually legitimate sites. That’s whyit’s important to protect your network with Web contentltering, which enables you to limit user access to certainwebsites, either because they violate company policies orbecause malware has been detected. “Nothing is 100%ool-proo,” Brecl said. “But it’s better than just trustingblindly.”
Cloud services: securing thevirtualized rontier
As you consider moving business-critical applications tothe cloud, security is bound to be top o mind. Althoughit trails other concerns, such as device thet, mobility andIT consumerization, only 40% o business and technologyleaders in a recent IDG survey
are “extremely or verycondent that their security inrastructure is prepared toprotect data in the cloud.”According to the IDG report, preventing data leaks is the topcloud concern, ollowed by managing access to data anddetecting and preventing intrusion.Visibility into your data is essential. “In a corporateenvironment where you could walk down and touch yourserver, you had the tools to provide a great deal o visibility,”Brecl said. “As you move into the cloud environment, theneed or that visibility does not go away.”As companies like yours balance cloud security issues withthe potential business benets, one approach is a hybrid