Response to Surveillance
One should also be aware of the existence of cyber threats, which at some level may even be destructive to the activities of companies or institutions. Data leakage can be a problem, but even a ransomware attack can paralyze or even destroy data resources. Therefore, it is only important to combat the effects of an attack, but most of all to avoid it.
Both business and public administration bodies now have the ability to effectively protect themselves also in the mobile area. The first step should be to recognize that smartphones must have the same status as company computers and that digital security programs implemented within the organization should also include these devices.
You should separate the private space from the workspace. This can be done by strictly ensuring that employees only use company smartphones for business purposes, preferably configured with MDM services. Education is also crucial here - even as part of remote work, training is possible, e.g. in the form of a webinar on digital threats.
Employees need to be aware of how even minor cybersecurity bugs can be a critical threat in a network-centric world. People who have access to sensitive data within the organization should only use certified devices that meet certain security standards. Popular models of smartphones dedicated to the consumer market can only be protected to a limited extent, and only at the software level, against surveillance or attempts to steal data. Hence, the safest solution is to go for solutions that are built with full security focus from the ground up.
At Bittium, we offer exactly such devices - smartphones from the Bittium Tough Mobile 2 product family - secured not only from the software side (e.g. hardened operating systems), but also by its hardware. The security of the Tough Mobile 2 is based on a dedicated security chip that allows the user's information to be secured in an unprecedented way by taking advantage of the tamper protection of the device. The device is able to monitor attack attempts in many different ways and prevent the theft of user data. For example, the device is able to detect circuit board level voltage and temperature attacks that attempt to drive microcircuits into a fault condition and thereby steal data. Server-side-protected VPN connections, proprietary application store, and well-defined Device Manager complement security and effectively prevent malware from entering the device.