Dell warns firms not to get complacent over mobile security
Businesses need to focus on managing apps, not devices, says CTO

Managing data and applications on mobile devices should be a priority for IT admins, according to Dell.
Businesses need to focus on the software side of things, not just the hardware it is running on, Don Ferguson, VP and CTO for software at Dell told delegates during a panel discussion.
"Poorly designed software is the main reason for security breaches. Step one [for protection] is to make sure you have proper expertise for developing software," he said at Dell World 2014.
"Mobile device security touches everything from data classification [to] privileges. It's important to secure the device and ensure that only the right people retain rights to the data."
Meanwhile, Prasad Thrikutam, president and global head of applications at Dell Services warned businesses not to get complacent as the sophistication of mobile devices increases.
"There are at least 368 security major breaches to the end of October10 million records have been compromised," he said.
"There are so many windows of vulnerability [on mobiles]. Just the aspect of GPS on phones exposes them. Advertisers can know your position and [hackers can] get into the back end. Most of us use simple, easy to remember, one-finger security codes that makes them easy to access [too]."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Thrikutam's advice is for businesses to implement platform-based security, adopt two-factor authentication, use containers to sandbox data/apps and also direct attention to securing back-end infrastructure.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Rebooting your BYOD strategy
In-depth With hybrid working becoming the norm, there's a need for a device management overhaul. What does BYOD 2.0 look like?
By Kate O'Flaherty
-
IT Pro Panel: Why BYOD is (sort of) here to stay
IT Pro Panel CIOs explain why they aren’t going all-in on personal devices
By Adam Shepherd
-
The IT Pro Podcast: Should companies spy on their employees?
IT Pro Podcast Where’s the line between security and surveillance?
By IT Pro
-
What are employers' responsibilities when we use personal tech to work from home?
In-depth With many more months of lockdown ahead of us, and workers reluctant to return to the office full time, it's time to think about roles and responsibilities
By Sandra Vogel
-
What is the 'personalisation of IT'?
In-depth With millions of people using personal devices for professional purposes while working from home, consumerisation has entered a new phase
By David Howell
-
WhatsApp delays controversial privacy update for businesses
News Users were asked to share data with WhatsApp’s parent company Facebook in order to continue using the service
By Sabina Weston
-
Lenovo ThinkPad L14 review: It’s not right but it’s okay
Reviews Pleasant enough for simple office tasks
By Sabina Weston
-
The consumerisation of IT continues apace – here’s how your business can benefit
In-depth BYOD may be a fact of business, but there are still more ways organisations can grow by embracing consumer tech
By Sandra Vogel