Hank Schless, senior security solutions manager at Lookout, discusses how to secure remote working via mobile devices.
<div class="c-article__content js-reading-content"> <p>After embarking on a second unforeseen year of mass remote work, everyone is now accessing corporate resources through the cloud. To help enable this, organizations are introducing new technologies into their standard workflows. The COVID-19 pandemic presented a new realm of unmarked territory as businesses quickly, and almost haphazardly, shifted all employees offsite. Corporate networks were unprepared to handle this new caliber of remote access, and significant security gaps were created along the way. But, organizational and individual data access to corporate and personal information began to evolve long before the pandemic.</p> <p>We want access to anything, from anywhere, on any device. To securely enable that desire, security teams already needed visibility into every device that accessed their corporate infrastructure and data. However, the pandemic catapulted this need to the top of every business leader’s mind, and the ability to block unhealthy devices that put an organization’s security at risk has never been more necessary. Now, with operations shifting almost entirely to the cloud for many, mobile workers have access to much more than just email. This access, however, comes with significant risks.</p> <p>Zero trust, which is rooted in the idea that no device is secure until proven otherwise, has become a widely accepted technical framework as businesses strive to monitor and maintain networks’ health with widely distributed endpoints. This philosophy should be applied to any device that interacts with your network, the most precarious of which are our mobile phones and tablets. With work increasingly being conducted outside the reach of legacy perimeter systems, there is no effective way to determine who or what device you can trust.</p> <p>To implement an effective zero-trust strategy, organizations must first accept three key factors:</p> <ol> <li>Your network is now in every home office</li> <li>Legacy and traditional security technologies do not apply.</li> <li>Mobile devices cannot be trusted.</li> </ol> <h2><strong> </strong><strong>Zero Trust and Personal Devices</strong></h2> <p>Bring your own device (BYOD) is another factor of remote work triggered long before COVID-19 uprooted the global workforce. In fact, Gartner predicted in 2018 that at least “80 percent of worker tasks” would shift to mobile devices by 2020. As this shift took place, mobile users and the organizations that support them must become acutely aware of the added risks posed by reliance on their smartphones and tablets.</p> <p>The mobile device that an employee uses to access their corporate data in platforms such as Google Workspace or Office 365 might be used later to browse social media or download a new app for personal use. These actions present new opportunities for the employee to be phished or introduce malware into their network. Many consumer-focused applications can be easily compromised, leaving the user’s data, and the corporate data they access from that same device, exposed. A robust approach to combating this risk is to deploy a zero-trust security model.</p> <h2><strong>Zero Trust and Cloud Security</strong></h2> <p>At this point, most organizations are embracing the benefits of cloud services to better enable the workforce and modernize their infrastructure. In doing so, they’re also enabling access to sensitive data from any device regardless of whether they manage it or not. This paradigm shift means legacy security strategies that rely on securing the four walls of the office are aging out, and security and mobility teams need to modernize their security strategy to include mobile zero trust if they want to keep up.</p> <h2><strong>Embracing Zero Trust</strong></h2> <p>Mobile devices are the cornerstone of what makes remote work so practical. They also present a new challenge to security teams that haven’t modernized their security strategy to include mobile devices. Since traditional perimeter security is outdated, security teams must move their critical functions to the mobile endpoint and secure data from wherever it is accessed. Zero trust strengthens and modernizes endpoint security by ensuring any device with access to corporate information is routinely evaluated for risk before being trusted. Mobile needs to be part of that.</p> <p><em><strong>Hank Schless, is senior security solutions manager at Lookout.</strong></em></p> <p><em><strong>Enjoy additional insights from Threatpost’s InfoSec Insider community by </strong></em><a href="https://threatpost.com/microsite/infosec-insiders-community/" target="_blank" rel="noopener"><strong><em>visiting our microsite</em></strong></a><em><strong>.</strong></em></p> <p> </p> <p> </p> <p> </p> <p> </p> <footer class="c-article__footer"> <div class="c-article__footer__container"> <div class="c-article__footer__col"> <a href="#discussion" class="c-button c-button--secondary">Write a comment</a> </div> <div class="c-article__footer__col"> <div class="c-article__sharing"> <p><strong>Share this article:</strong></p> <nav class="c-nav-sharing"> <div class="social-likes social-likes_notext" data-title="Zero Trust: The Mobile Dimension" data-url="https://threatpost.com/zero-trust-mobile-dimension/165349/" data-counters="yes" data-zeroes="yes"><div class="facebook" title="Share via Facebook"></div> <div class="twitter" title="Share via Twitter"></div><div class="linkedin" title="Share via LinkedIn"></div> <div class="reddit" title="Share via Reddit"></div> <div class="flipboard" title="Share via Flipboard"></div> </div> </nav> </div> </div> </div> <div class="c-article__footer__container"> <div class="c-article__footer__col"></div> <div class="c-article__footer__col"> <ul class="c-list-categories"> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/cloud-security/">Cloud Security</a></li> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/infosec-insider/">InfoSec Insider</a></li> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/mobile-security/">Mobile Security</a></li> </ul> </div> </div> </footer> </div>