Mobile, security perspective, risk, threats


Mobile devices

A security perspective

BYOD (Bring Your Own Device), COPE (Corporate Owned Personally Enabled) or CYOD (Choose Your Own Device) are names used for projects aiming to put corporate data on mobile devices used by employees, even if those names only describe the provisioning approach of an often more complex mobile devices management project.

Executive Summary

How to ensure that security threats will not jeopardise your mobile strategy

Recent mobile devices such as smartphones and tablets enable employees to work anytime and anywhere, and are powerful enough to handle most business activities and data, including email, documents, contacts and agendas. They are also used extensively for social media and access to cloud-stored data. This intermingling of access to business data and use of personal software applications in one device makes mobile devices a prime target for hackers and provides new entry points for attack, in addition to being easily lost or stolen.

Mobile devices are a good example of the new information security paradigm resulting from the deperimeterisation of IT, where IT assets, users and data are moved outside of the traditional Information System boundaries.

Many Luxembourg organisations across all industries are currently dealing with this type of project (either as a new service or as the migration of an obsolete system) and are facing the new security challenges presented by IT de-perimeterisation.

PDF file - size: 195kb

Inside magazine issue 6, October 2014

Inside is Deloitte’s quarterly magazine offering an exclusive insight into best practices, trends and opportunities faced by our clients across all industries.

Inside focuses on the main hot topics relevant for the market (Asset management, Banking, Insurance, Public sector, Healthcare, Private equity, Real estate, TMT, Manufacturing and consumer business, Transport and logistics). 

Inside magazine issue 6 - PDF file - size: 5.9mb
Did you find this useful?