System breach: cybersecurity expert discusses steps to protect mobile devices, company info.

AuthorStark, Jeffrey
PositionInterview

Consider the following:

* While 87 percent of executives use a laptop. f12 percent indicated they have sonic kind of smartphone.

* 81 percent of companies surveyed reported the loss of one or more laptops containing sensitive information during the past 12 months.

* 64 percent of companies surveyed reported that they have never conducted an inventory of sensitive consumer information.

These facts (taken front Forbes' "The Untethered Executive" survey and a Ponemon Institute LLC and Vontu Inc. survey) beg the question: Is your company secure when it comes to mobile technology? We spoke with cybersecurity expert Jeffrey Stark in help answer that question.

Stark's roles as an IT director at a publicly traded network security company and as president and co-founder of a managed network security services provider has allowed him to experience the firsdhand challenges of cybersecurity on mobile technology, such as cell phones and tablets, as these devices were emerging into the workplace. He has strategized a number of hest in class security solutions throughout his career.

Stark is an audit partner with Sensiba San Filippo LLP, where he specializes in serving venture-backed technology companies and is a technical resource for issues including revenne recognition, equity/stock option accounting issues and financial reporing. He's also his firm's leading expert on mobile cybersecurity. Prior to joining Sensiba San Filippo, Stark was president and co-founder of Ignyte Technology, Inc.--a managed network security services provider--where he ran the finance and operations functions.

Alter successfully completing the sale of the business to a publicly traded company in 2001, Stark decided to leverage his real-world operations and management experience with technology companies by joining the public accounting profession.

What are the biggest weaknesses in cybersecurity for mobile devices?

Physical security for mobile devices is inherently limited, thus reliance on remote wipe functionality/enforcement of security is the best option. Proper technical and process implementation of these remote administrative options by a company are key.

Are there any best practices you can recommend?

* Have a BYOD (bring your own device) policy updated and signed by all employees. Keep the policy relevant to the devices on the market. Make sure the policy includes things like passwords on the device and the use of encryption.

* Enforce remote admit access to connect to...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT