Connecticut Office CALL US AT (203)-295-5050 | New York Office (646)-693-1950
Home - Article

Featured Article

January 30, 2017

How Many Unsecured Phones Are Being Used In Your Company?


Last week, a report broke that President Trump is still using a personal Android phone to post on Twitter. According to the New York Times, Trump is not using the device to make calls. However, it’s unclear what security measures the device has in place, and how vulnerable it is to hacking. There are concerns that the device could be a national security threat.

This follows another report from the New York Times, which claims that Trump had received a phone from the Secret Service that is secure and encrypted. However, he is still using the Android device.

Of course, Trump isn’t the first president to run into BYOD issues. President Obama, for instance, famously continued to use his beloved Blackberry after taking office in 2008. This device was eventually exchanged for a stripped-down model out of security concerns, though, meaning one that could not take pictures, play music or even text. So it will be interesting to see if Trump decides to continue using his device in the months to come, or whether he takes the safe route migrates to the his new phone.

Regardless of how the situation plays out, it’s a reminder that:

  • “Bring your own device” (BYOD) is happening everywhere, including inside of your own enterprise. Employees across all departments — from entry-level workers to C-level executives — are now using personal devices to communicate and access sensitive work information.  
  • Every organization needs clear rules governing BYOD usage.
  • Mobile devices are now a top target for hackers.

In a recent study, for instance, over 84 percent of respondents claimed they are very concerned about malware threatening their mobile applications. Sixty percent of respondents claimed that their organization had been breached by an insecure mobile application in the last 12 months. And less than 30 percent of mobile applications are tested for vulnerabilities.

This last statistic is particularly frightening. When BYOD usage goes unchecked, this creates something called “shadow IT” which is a situation where IT has little to no visibility into the technologies that employees are using to access important information. Shadow IT is highly problematic from a security perspective, as it prevents IT from properly detecting and responding to security threats associated with phishing, hacking and device theft. IT can only protect against threats that it knows about.

So stop and think about how many unsecured personal devices are being used in your organization. If your business’s mobile usage has spiraled out of control, it’s time to take action before a costly security incident arises.

A managed services provider (MSP) like Apex Technology Services of Norwalk, Connecticut can provide your business with the cutting-edge tools it needs to streamline mobile device management. Your business can gain real-time visibility into every mobile device on the network, so that IT can more effectively respond to threats.

To learn more about how Apex can help your business, click here.

A new breed of hacktrepeneurs has awoken and they have little to fear and everything to gain by infecting as many companies as possible and extorting money from them. Apex Technology Services stands ready to protect your company regardless of whether it’s located in New York CityWhite Plains, New York; Connecticut; Australia; Europe; or anywhere else. Our full suite of cybersecurity and IT support services is at your disposal, enabling you to spend less time worrying about and more time growing your business.

In addition, our new Cybersecurity Compliance Certification for law firms will help keep your legal practice from becoming the next Panama Papers victim. This baseline cybersecurity audit for the legal industry should be considered seriously by all law firms.





Apex Technology Services
Choose from comprehensive, affordable solutions for IT consulting, network services and computer help desk support in Fairfield county including Norwalk, Darien, Stamford, Greenwich, Ridgefield and Bridgeport. Also Westchester county including Rye, New Rochelle, White Plains, Yonkers and New York including Manhattan and the five boroughs.
IT SERVICES

IT SERVICES

Apex Technology Services is a cutting edge MSP offering quality IT support to financial, medical, legal, Fortune 500 and government agencies while adhering to the highest of quality...

LEARN MORE
CYBERSECURITY Services

CYBERSECURITY

Apex Technology Services has the cybersecurity expertise to help your business in a world filled with attackers looking to shut down your business hold it ransom or steal your valuable...

LEARN MORE
CLOUD SERVICES

CLOUD SERVICES

Apex Technology Services delivers a combination of traditional IT functions such as infrastructure as a service (IaaS), applications, software, security, monitoring, storage...

LEARN MORE

Ranked Top 10 Network security Solution Provider

One Stop Shop For All Your Technology Needs


Contact us Now!