Mobile application developers are a busy lot these days as organizations look to put the latest applications in the hands of mobile employees. However, as organizations' networks extend ever outward and "over the air," data and application security are primary concerns. Enterprise networks are a potential treasure trove for increasingly organized and sophisticated cyber-criminals, and the newness of mobile devices presents them with an enticing entry point.
The vulnerability of mobile applications and data can be categorized into two areas: data transmission and data storage, according to Hansen Lieu, marketing director of SAP CRM Global Marketing.
"When the mobile application is exchanging data with the server, they typically rely on the public wireless networks to communicate with the server back at the office. Potentially, this communication linkage can be intercepted and data copied," Lieu says.
"The second vulnerable area is the data residing on the device. Many mobile applications store some data on the device to optimize performance and usability. So, if the mobile device is lost or stolen, data stored on the device can be accessed by unauthorized parties."
Source: CRM Buyer, http://crmbuyer.com
Enjoy curated articles directly to your inbox.