The trusted alternative to mass market instant messaging solutions
Boost communication by inviting thousands of members in dedicated chat rooms!
Comment pouvons-nous vous aider ? Vous trouverez l'aide qu'il vous faut.
Register or Connect directly to Citadel Team
Cryptobox provides businesses and organizations with a sharing and collaboration solution to secure internal and external exchanges, using end-to-end encryption.
Cryptobox is the first secure sharing and collaboration solution to provide end-to-end data encryption, whether your device is a smartphone or a computer.
The digital transformation affects all businesses and organizations, from the smallest to the largest. This transformation brought about by technological developments offers many benefits:
To meet the new challenges of mobility and remote work, Ercom has developed Cryptosmart PC, a sovereign VPN solution to secure the connections of your remote Windows computers.
Cryptosmart is the only “Restricted” French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications on consumer devices.
Cybels Hub DR, the first "Restricted" level accredited cloud solution to help inter-entity collaboration in a secure environment with partners! Collaborate in voice or videoconferencing, exchange data with your partners, all at the "Restricted Distribution" level, on a cloud operated and secured by Thales.
Posted 3 décembre 2019
70% of our time spent online now occurs on smartphones, which are becoming the preferred communication tools for agile organizations with open ecosystems. As a result, mobile traffic will increase sevenfold by 2022. This is why mobile cyber security is a critical issue for CIOs and business leaders: 150 million mobile attacks globally have been identified during the first semester of 2018 alone! Faced with this increase in cyber-attacks and the legal obligation imposed by GDPR to protect personal data on all components of an information system, including mobile devices, organizations must find the right balance between their security level, their costs and their teams. Mid-sized organizations and SMEs, often having limited resources, may find it difficult to reach such balance. However, solutions exist to efficiently protect mobile devices without exceeding budget.
70% of security issues are directly associated with employees! The first and foremost risk factor in an organization remains human, whether intentional or not. Installing infected applications, sharing documents through a consumer messaging system or connecting to an unsecure Wifi network… Employees are not always aware of the risks they incur for themselves and their organization’s information systems!
Indeed, few employees are really aware of cyber security, and the now widespread BYOD (Bring Your Own Device) trend, which consists in using personal devices for business purposes, greatly increases the risk of theft or loss of business data. Not to mention Shadow IT, which makes it very difficult to control devices and their use. Most often because of ignorance, employees mistakenly think they are protected. This is why it is essential to empower them through awareness training and workshops. By sharing information and best practices tailored to the needs of your employees, your organization can prevent incidents.
Some of the major risks your employees are exposed to:
While employee awareness and training is a first line of defense against mobile cyber-attacks, it is not enough on its own to counter all threats, as they are becoming more and more sophisticated. Therefore, you need solutions matching your actual needs.
Within an organization, not all users have the same needs… or the same uses. For instance, sedentary employees who do not exchange sensitive data are less exposed and require a lower level of security. For these employees, it is necessary to provide them with professional tools aligned with your organization’s policies, to avoid Shadow IT and known threats.
Mobile or sedentary employees who exchange confidential information will therefore be more targeted. First, it is necessary to assess their uses in order to configure smartphones and tablets according to their profile and specific usage. This will ensure that you deploy the right solutions for their needs.
Then, according to best practices, define a strict internal security policy for mobility: mandatory smartphone activation code, lending smartphones or opening business documents from your personal smartphone is prohibited… You can also implement an administrator-controlled solution that will allow containerization to delimit business uses and personal uses, thus limiting the risks of compromising business data. Similarly, it is possible to limit access to the corporate network based on the mobile user’s authorization level.
Mobile cybersecurity challenges require addressing certain issues beforehand: How many business smartphones in your fleet? What models and OS? What are the main uses? How many mobile employees? Do you have clients or suppliers working in sensitive industries (defense, health, government, etc.)?
Implementing security solutions is not necessarily expensive or complex if the organization is appropriately protected. Prepare different scenarios: theft of business and personal data, sabotage, espionage, etc. How much would disaster recovery cost? What would be the loss of income? What are the risks of financial penalties if the organization does not have a security system in place? What would be the impact on your image?
The answer to these questions will allow you to adjust your mobile security policy closer to the needs of your users, and, in this sense, closer to the required budget.
 Médiamétrie, 2018 – https://www.mediametrie.fr/fr/lannee-internet-2018
 According to the Mobile Visual Networking Index – https://www.cisco.com/c/m/en_us/solutions/service-provider/visual-networking-index.html
 ThreatMetrix Report, H1 2018 – https://www.globalsecuritymag.fr/Rapport-ThreatMetrix-au-premier,20180912,80763.html
 “2017 Cybercrime Report: A Year in Review” ThreatMetrix Report – https://www.threatmetrix.com/info/2017-cybercrime-year-in-review/
Cet article vous a plu ? N'hésitez pas à le partager