Mobile Security and Public Sector
Regarding mobility and security, public sector is facing the same challenges as the private sector. Employees working only at the office is not any more the rule, and IT have to deal with mobile laptops or smartphone they do not fully manage.
Consequently, employee mobile device poses at least the same IT security risks as in the private sector, and even more if you take into account the critical missions public servant have to deal with, and the most personal information they manage: taxes, health, law and order, none of this information can be leaked, and represent a threat not only to privacy, but to homeland and personal security as well.
More and more public servants are going mobile and are using smartphone apps for their daily work, and at the same time attackers’ skills are growing exponentially: the need to have efficient enterprise security solution for mobile devices is becoming more and more urgent.
Government agencies’ Mobile devices are at risk while in the wild: rogue or compromised Wifi Connections, attacks on mobile operating systems vulnerabilities, side-loading of apps, installation of non-compliant apps, etc. Cybercriminals can easily gain access to government data and device
The more mobile devices are used by public agencies employees and contractors, the bigger is the threat landscape: accessing email or any other government network or app from mobile nearly doubles the number of endpoints that have to be secured by IT Security teams.
And this task is even more challenging when you take into account that IT often lacks full mobile device admin access, (no EMM, or BYOD environments), and therefore cannot apply efficient security measures, updates or access restriction.
Mobile apps can be an attack vector in several ways: On the one hand, an attacker can try to gain access to a device using a legitimate app vulnerability. On the other hand, the attacker can create its own malicious app, making it look like a legitimate app, and using social engineering or other techniques, have their victims install the app in order to spy on them and compromise mobile devices.
Even for government agencies that have made the effort to define network access policies and procedures, Rogue networks will appear as official networks, so that employees can be deceived and think they are actually connecting to a safe network. These malicious networks empowers attackers that can perform man-in-the-middle (MITM) and other traffic listening or content/app pushing attacks.
Protecting public employee device and data
Samoby Mobile Threat defense is easy to install, and will immediately begin to protect iOS and Android devices against rogue networks and apps, network attacks, phishing attempts, or possible web attacks. moreover Samoby is able to perform local mitigation actions, by blocking apps or network connections, and providing immediate notification and information to employees and IT staff.
On-device detection and prevention
Protecting against zero-day threats requires more than the ability to identify known malware. Samoby tracks locally all mobile device internet connections in order to detect rogue traffic to sensitive or unusual destination, at unusual timeframes or of unusual volumes.