Pulse 2011: Businesses must tackle growing mobile threat
Mobile security threats have grown exponentially in recent years and organisations must ensure policies are in place to stave off attacks, according to IBM.


Businesses are focusing more heavily on security but they still need to do more to ensure the pros of using mobile devices aren't outweighed by the cons.
So claims research by IBM which acknowledges that organisations are getting better at proactive security management but that more work is required to ensure the blurred lines between consumer and business devices don't adversely affect security efforts.
Some 90 per cent of business leaders plan to invest to beef up security management and resources, according to IBM research unveiled at its Pulse 2011 event this week in Las Vegas.
"Security has to be a forethought, not an after thought," said IBM's Scott Hebner. "And you have to empower everybody, you can't just have the chief security officer (CSO) looking after the security policy. That won't work."
More than half of the IT decision makers surveyed said they plan on increasing spending on security for smartphones and other mobile devices.
Almost three-quarters (73 per cent) of respondents said such devices are allowed to connect to their networks, but more than a third (36 per cent) admitted they don't feel the security is quite up to scratch to ensure safe access and use.
IBM also gave event attendees insight into a report on the issue, which, when released later this month, will highlight the growing issues around mobile security and offer guidance as to how best to tackle them.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
While there is undoubtedly benefits on offer to businesses that let employees use mobile devices, security is still a big hurdle, according to the research.
It's imperative mobile security best practices are created and enforced, according to Tom Cross IBM X-Force's threat intelligence manager.
"You have to have a set of policies for how corporate data should be managed on a laptop. Can you include those same policies when that data finds its way onto a tablet?" he said.
"[Ask] what are my policies for information use and how can I apply them to these devices and what tools can I use to enforce these policies?"
Such security policies need to apply to both company owned and employee-owned devices, according to Cross.
Maggie has been a journalist since 1999, starting her career as an editorial assistant on then-weekly magazine Computing, before working her way up to senior reporter level. In 2006, just weeks before ITPro was launched, Maggie joined Dennis Publishing as a reporter. Having worked her way up to editor of ITPro, she was appointed group editor of CloudPro and ITPro in April 2012. She became the editorial director and took responsibility for ChannelPro, in 2016.
Her areas of particular interest, aside from cloud, include management and C-level issues, the business value of technology, green and environmental issues and careers to name but a few.
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
Third time lucky? Microsoft finally begins roll-out of controversial Recall feature
News The Windows Recall feature has been plagued by setbacks and backlash from security professionals
By Emma Woollacott Published
-
Put AI to work for IT operations
whitepaper Reduce the cost and complexity of managing hybrid applications
By ITPro Published
-
AI in the retail industry is spreading beyond the IT department
News AI has become a strategic imperative for retailers, delivering marked productivity gains
By Emma Woollacott Published
-
Maximizing contact center operations with generative AI assistants backed by responsible AI principles
whitepaper Reduce the cost and complexity of managing hybrid applications
By ITPro Published
-
IBM just launched powerful new open source AI models – here’s what you need to know
News Available under the Apache 2.0 license, IBM's Granite 3.0 models are trained on enterprise data and can out-perform the competition
By Emma Woollacott Published
-
Achieving business outcomes with generative AI
Webinar Take your hybrid cloud journey to the next level with generative AI
By ITPro Published
-
Wimbledon’s new Catch Me Up AI feature promises to keep fans up to date at the tournament – after it irons out some of the wrinkles
News The latest feature to come out of IBM’s partnership with Wimbledon will keep fans engaged from the early stages right through to the final with dynamic player insights
By Solomon Klappholz Published
-
AI demands new ways of data management
whitepaper The data leader’s guide for how to leverage the right databases for applications, analytics and generative AI
By ITPro Last updated
-
AI governance for responsible transparent and explainable AI workflows
whitepaper Build greater trust in your AI
By ITPro Published