The Year of the Snake

According to the Chinese Zodiac, 2013 is the Year of the Snake. According to our anti-virus partner Kaspersky Labs, 2013 is also the year of new security threats and challenges that IT organizations face in 2013 won’t be limited to normal security concerns.

According to the Chinese Zodiac, 2013 is the Year of the Snake. According to our anti-virus partner Kaspersky Labs, 2013 is also the year of new security threats. The challenges that IT organizations face in 2013 won’t be limited to normal security concerns. There’s a belief out there that we will see attacks on mobile operating systems, such as Android and iOS, and the devices they support. With so many smartphones and tablets running mobile operating systems, IT organizations need to figure out how to protect those devices and the data on them.

This past October in Informationweek.com reported that 8% of all Android apps where found to contain SSL/TLS code that could potentially make them vulnerable to Man-In-The-Middle (MITM) attacks. MITM are a form of eavesdropping where the attacker makes an independent connection between two different potential victims, often time using chat or other real-time communications as a way to pass false information.

With so many personal mobile devices brought in to the corporate IT environment, these devices and their vulnerabilities put your organization’s information at risk. Having a management and security solution that can address both traditional endpoints like desktops and laptops as well as mobile devices allows IT organizations to manage threats and address vulnerabilities of those devices much faster. Data breaches can cost companies millions of dollars, which is why it is extremely important for organizations to be proactive in protecting and securing these devices.

Mobile device attacks are not about finding corporate data. Attackers also attempt to gather as much contact information, pictures, and other personal information as possible. Even more disturbing, researchers have found ways to turn smartphones into portable spies by using their cameras, GPS, and accelerometers remotely. Imagine having someone attack the phone of the CEO, top engineer or other employee, connect to it remotely, and use it to spy on meetings or other important gatherings.

LANDesk and our technology partners realize these threats and continue to develop solutions that protect and manage endpoint devices proactively, rather than being reactive and face the expensive task of managing attacks and the potential data loss these attacks pose.  Check out our current security and mobile device management solutions we offer. And keep your eye out for new solutions we will offering over the coming months that help organizations like yours address these problems and new ones that pop-up every day.