private enterprise app to combat costly data breaches and ... papers/adeya private enterpri… ·...

9
Private Enterprise App to Combat Costly Data Breaches and Violations www.adeya.ch

Upload: others

Post on 07-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Private Enterprise App to Combat Costly Data Breaches and ... Papers/Adeya private enterpri… · almost half of British businesses are relying on consumer-grade software for their

Private Enterprise App to Combat Costly Data Breaches

and Violations

www.adeya.ch

Page 2: Private Enterprise App to Combat Costly Data Breaches and ... Papers/Adeya private enterpri… · almost half of British businesses are relying on consumer-grade software for their

adeya.ch +41 22 566 14 80 [email protected]

adeya.ch

A Mobile-First Business Model Is Becoming Necessary

In the average modern complex enterprise, employees are permitted to bring their own devices to work and to communicate with said device. Instantaneously collaborating while on the move or with remote employees through conferencing and video calling capability makes tasks quicker and simpler; 70% of organizations already know this and allow personal devices for work use1. However, the use of personal devices for business purposes is fairly recent and can have some clear risks that it’s important to be aware of.

Consumers’ use of mobile messaging apps has skyrocketed, and by 2021 it’s expected that messaging apps will reach 2.48 billion users2. This movement is here to stay; in fact, almost half of British businesses are relying on consumer-grade software for their mobile messaging needs 3.

There are many reasons why businesses are getting more done with mobile technology, and this is largely due to the fact that the manner required to conduct business has become drastically more mobile in recent years than it was in the past. Communicating through phone calls has evolved into mobile messaging, making business much more seamless and instantaneous.

The progression continues with the open rate of mobile messages of 98%, and the open rate of traditional email is just 22%4. Changes in mobility trends have a major impact on which medium is used. Since employees are no longer seated at a desk with a desktop computer and phone, technology needs to be portable in order to be fully utilized.

Clearly, secure mobile messaging within an enterprise setting creates many positive forces that are too compelling to ignore.

2

3

“Adeya was introduced to us forsecure communication between specific people. The implementation was quick and the support is excellent. We are very satisfied with the service and its functions and can only recommend Adeya to others.”

Fiedler Beate TamaraCyber Security OfficerAlpiq

Page 3: Private Enterprise App to Combat Costly Data Breaches and ... Papers/Adeya private enterpri… · almost half of British businesses are relying on consumer-grade software for their

adeya.ch

adeya.ch +41 22 566 14 80 [email protected]

Improve Productivity

Mobility increases how fast business processes can be handled, and even makes employees more available than they would be without the option to go mobile.To be exact, because of smartphone use, it’s been estimated that workers gain an average of 58 minutes of productive work time daily (productivity was a 34% increase)5.

To be more productive, senior management needs to be more available and increased mobility can help them delegate tasks that aren’t as important. Secure mobility can help management can add more value while in between meetings or when traveling since 92% of senior executives use a smartphone for business6.

60% of employees believe that they’re more productive working for a business that allows them to use mobile-first, according to Aruba Networks7. This is due to the portability and capabilities that mobile technology can now offer.

Increase Employee Satisfaction

The digital workplace is almost always considered an attractive one, and the freedom that is intertwined is a glimpse of how work can be done more innovatively. It’s been found that the technology that employees use daily has anenormous impact on their overall experience at work8.

The technology that a company uses will soon become even more important. By the year 2020, tech-savvy millennials will comprise 50% of the workforce across the globe, and by 2025 that number increases to 75%9; the shocking part is that 71% of these workers expect to see an intuitive and efficient technological experience while at work.

This means that job satisfaction can be compromised if employees have to deal with challenging software or needlessly complex telephones. Since happier workers are usually more productive, capable software that is secure is a serious opportunity for enterprises. Satisfied employees tend to also help to put customers in better moods.

Accommodate Workers in the Field

There has been a recent push towards enterprise mobility. One of the reasons for this is because enterprise mobility allows businesses to look outside of geographical limits to locate the best talent for the position. Teams that work from more distributed locations can still work synchronously together without missing a step10

Reduce Response Rate and Time

Mobile messaging takes place instantaneously, which means that work keeps moving. Having the ability to communicate with customers in real time helps close the deal faster. Improving the customer’s response rate and time directly increases company revenue.

Employee visibility is improved, making team management

accurate and easy. Managers can see which employee is available and close by to wherever they are needed. A mobile database allows teams to see inventory amounts from any location.

Create a Seamless Workflow

Smaller teams within the enterprise must have the tools that they need to communicate with one other, partners and clients in an engaging and continuous manner, without interruption11. Moving to a paperless workflow saves money, time, and it also lowers the risk of errors that can occur through manual entry.

Poor processes can be detrimental to complex enterprises. Mobile devices can—and should—streamline any task within a workflow that can be simpler, just like how video and conference calling makes communication easier.

4

5

.

Page 4: Private Enterprise App to Combat Costly Data Breaches and ... Papers/Adeya private enterpri… · almost half of British businesses are relying on consumer-grade software for their

adeya.ch

adeya.ch +41 22 566 14 80 [email protected]

The High Cost of Using Consumer Apps for WorkIn business, communicating properly requires information to be exchanged, which also happens to be the currency of cybercrime.

Malicious Security Attacks

Consumer applications can be dangerous because the exposure to malicious mobile attacks increases exponentially when software is not secure. When asked, 64% of security professionals felt that they could not successfully prevent a mobile cyberattack12, which is why it’s imperative to ensure that data stays protected.

No Administrative Power

Mobile phones pose a complex threat that intertwines between the apps, devices, and mobile networks. This allows network administrators virtually zero degrees of control when employees use consumer applications for work.

It’s not just about overseeing the security of the device; the applications on the device also must be managed. At the application level, there must be a separation between the private business private data and the personal data.

Here, the Adeya app comes with a secure business connections administration interface to manage communities through a user-friendly and highly secure web application. Efficient management and the capability to broadcast information and implement company policies can increase employee engagement and effectiveness of the product.

Data Breach Equals Lost Income

Lost revenue, decreased productivity, and reputational damage are inevitable outcomes of lost data for any company. Since 45% of executives have apprehensions regarding security13, it’s important to avoid utilizing unsecure consumer-grade data storage options such as iCloud.

It’s widely known that economic losses can be significant, but the average loss for a healthcare data loss was $2.2 million14. The price of lost data depends on whether or not the data was lost maliciously, and what the value of the data was that was lost.

Small businesses could be particularly susceptible because they tend to have smaller margins for error. Business owners of smaller companies have been found to be unprepared15

when it comes to backing up data, but even brief periods of interruption can put a smaller company out of business.

Intellectual Property Needs to Be Protected

Intellectual property can comprise over 80% of just one organization’s value16. Data exposure, theft of intellectual property, and ransomware that can lock devices post the same risk for mobile devices as they do for traditional computers.

Since data is everywhere, it’s important to be aware of where exactly your IP data is and what safeguards you have in place to protect it. There are many assets that are at risk, the most value include confidential business data and trade secrets.

Copyrighted information like data analytical codes are valuable targets, and trade secrets can include numerous pieces of information such as a manufacturing method, product formula, or a proprietary design. Confidential business data could be plans for a merger, negotiations, and strategy. Almost every enterprise sector and industry is susceptible to intellectual property theft.

6

7

Page 5: Private Enterprise App to Combat Costly Data Breaches and ... Papers/Adeya private enterpri… · almost half of British businesses are relying on consumer-grade software for their

adeya.ch

adeya.ch +41 22 566 14 80 [email protected]

Threats Against Mobile Business Users Enterprise professionals that use mobile devices are taking part in tasks that would have never been available before without a firewall. This is why it’s imperative for security to be integrated into the application, mobile, and device levels, which can be accomplished by utilizing a platform like Adeya.

Hazardsare being exposed across three main areas:

App Level

A primary concern that enterprises have is confidentiality. Since mobile apps have become more widely used, security for apps has been a problem. White Hat Security discovered that there were security vulnerabilities in 90% of the Android apps that they tested, 33% of business apps, and 30% of iOS apps17. This is alarming as intellectual property and proprietary data are often exchanged between staff members on a daily basis through public messaging apps just to facilitate basic communication in order to get their jobs done.

Professionals have even been fined for sharing confidential organizational information on WhatsApp18. Flaws have been found in the encryption used in public apps like Signal, WhatsApp, and Threema. Consumer-grade apps expose contacts and IP addresses to the external world, which violates global data protection laws.

Mobile Network Level

Cybercriminals tend to manipulate the integrated SS7 (Signaling System No 7) protocol that mobile operators use. Through this, hackers can perform surveillance on text messages and even calls at any point that they choose to.

IMSI catchers that operate on Wi-Fi networks imitate a cellphone tower so that they can store the number and then monitor and track every movement, phone call, texts, and Internet activity that the user makes19.

Device Level

While mobile-first is becoming a basic requirement for effective business communication, the types and capabilities of mobile malware are also increasing. Much of the mobile-lead enterprise remains unprotected to precarious ransomware and mobile trojans. Alarmingly, in Q2 of 2018, Kapersky Lab found 1,744,244 occurrences of mobile malware, which is almost half a million more than the previous quarter20.

Clearly, any messaging platform utilized by an enterprise must be able to be simply integrated with an MDM, which provides a means to control and secure devices.

8

9

Page 6: Private Enterprise App to Combat Costly Data Breaches and ... Papers/Adeya private enterpri… · almost half of British businesses are relying on consumer-grade software for their

adeya.ch

adeya.ch +41 22 566 14 80 [email protected]

Most Important Criteria in Selecting Your Enterprise AppThe use of mobile applications is becoming essential to business use. Collaboration software is plenty, but enterprises would benefit from switching staff from using many mismatched apps to an all-inclusive strategy.

An all-inclusive approach to mobile apps helps to increase security, keep projects on track, and avoid costly maintenance and/or data loss problems. The five most important criteria that companies should expect from a mobile application platform are below:

High Grade of Security Through End-to-End Encryption

Each business call, SMS, component, and supporting file needs to be secure. We use 256-bit encryption, which is the industry standard, and it protects all sensitive data. With proper security protocol in place, your enterprise can now prevent unauthorized changes, views, tampering, phishing attacks, and spamming.

11

Global Data Protection Regulation Compliance

The European Union has recently passed the global data protection law (GDPR), which shifts the ownership of customer data from the businesses that use it to the customer. This means that any enterprise app in question must be GDPR-compliant. Under these regulations, customers must consent to have their data stored and can withdraw their consent at any point.

After Europe initiated the GDPR, other companies including Japan, Switzerland, Canada, and the United States strengthened their data protection laws as well. Strict privacy regulations are the new normal, and enterprises will need to meet these regulations in order to succeed. Businesses will be penalized with fines 4% of their rate of turnover for the year, or€20 million21.

According to the GDPR, customers are entitled to having a copy of their data that is stored with any company, along with the right to know why the data was retained, how it was categorized, how long it will be retained, and if it was shared with a third party. Customers also have the right to be notified within 72 hours if a security breach occurs.

The best enterprise application software will also have a method of generating audit and security logs. These can be thought of as insurance, as they can act as evidence to demonstrate that a data breach did not occur or that a customer’s data was actually deleted as requested.

Page 7: Private Enterprise App to Combat Costly Data Breaches and ... Papers/Adeya private enterpri… · almost half of British businesses are relying on consumer-grade software for their

adeya.ch

adeya.ch +41 22 566 14 80 [email protected]

13

User Experience Without Security Compromise

Enterprise applications that have a lacking user experience can have an exceedingly negative influence on the company’s revenue procurement and efficiency. As new devices are being released frequently and users sometimes prefer to switch from one to another, it’s becoming imperative for optimal usability to have a seamless user experience across many devices. Usually, security is delivered but the user experience suffers greatly. With Adeya, the best of security and a first-rate user experience are combined.

These are just a few of the most important features to consider. Additional considerations should be to increase employee engagement through secure messaging and file sharing, PBX Integration, on-premise deployment, cloud deployment, and white-labeled UI.

Adeya offers all of this for the highest value, setting the bar far above the rest. The best method of shielding your enterprise’s architectural processes and elements is with the Adeya platform.

12

Central Management and Industry Specific Software Integration

Easily generate user activity reports through the management control panel, which also allows options to ensure that only qualified users are given access. It is now simple and fast to securely broadcast updates and implement company policies.

High-Value for Money

Whether they know it or not, most businesses are in need of software that can assure complete securitywhile offering a wide range of functions. At Adeya, we strive to help individuals become more aware of the harm that a data breach could do to their business when depending on mobile devices to communicate, and we would like to kindly offerour software as a cost-effective and high-value solution to guarantee that proprietary information stays private.

Page 8: Private Enterprise App to Combat Costly Data Breaches and ... Papers/Adeya private enterpri… · almost half of British businesses are relying on consumer-grade software for their

adeya.ch

adeya.ch +41 22 566 14 80 [email protected]

ConclusionIn the modern age of data breaches and privacy concerns, it is imperative for enterprises to protect their intellectual property and remain GDPR compliant. Shadow IT app for business use must be avoided, and the way to ensure compliance is to provide collaborative applications that include file sharing and messaging capabilities.

With Adeya’s powerful collaboration tools, your workforce can take work phone calls when away from the office, send encrypted SMS messages, share files securely, and take private notes.The contact list is secure and managed centrally, which means that everyone authorized can have access to updated contact information for both employees and clients.

Through giving your customers a chance to use your branded application, you’ll better be able to serve them and will be able to resolve employee requests for capable apps. Enterprise revenue stream will flourish, all data exchanged within the app will be secure, and your business will be GDPR-compliant.

To find out more about how Adeya can help you meet regulatory requirements while growing your enterprise B2B offerings and providing the apps that your employees need, contact Adeya at +41 22 566 14 90 or email [email protected].

References1. Smart City; 2015 IEEE International Conference, BYODsecurity—A new business challenge: https://arxiv.org/pdf/1601.01230.pdf

2. Statistica, Number of mobile phone messaging appusers worldwide from 2016 to 2021 (in billions): https://www.statista.com/statistics/483255/number-of-mobile-messagingusers-worldwide.

3. Business Advice, A Majority of UK Firms Are MissingOut On the Potential of Messaging for Business: https://businessadvice.co.uk/procurement/technology/a-majority-of-uk-firms-are-missing-out-on-the-potential-of-whatsapp-for-business/

4.The Radicati Group, Instant Messaging Statistics Report(2018-2022): https://www.radicati.com/wp/wp-content/uploads/2017/12/Instant-Messaging-Statistics-Report-2018-2022-Brochure.pdf

5. Samsung Insights, Employees Say Smartphones BoostProductivity by 34 Percent: Frost & Sullivan Research:https://insights.samsung.com/2016/08/03/employees-say-smartphones-boost-productivity-by-34-percent-frost-sullivan-research.

6. Business Wire, IDG Global Mobile Survey Puts SpotlightOn The Mobile Evolution: https://www.businesswire.com/news/home/20140630006098/en/IDG-Global-Mobile-Survey-Puts-Spotlight-Mobile.

7. Aruba Networks, Mobility, Performance, andEngagement: http://www.arubanetworks.com/pdf-viewer/?q=/assets/EIUStudy.pdf

8. Forrester, Put A Plan In Place To Improve The EmployeeExperience: https://www.forrester.com/report/Put+A+Plan+In+Place+To+Improve+The+Employee+Experience/-/E-RES61611.

9. Forbes, How Millennials Are Shaping The Office Of TheFuture, https://www.forbes.com/sites/hp/2017/09/22/how-millennials-are-shaping-the-office-of-the-future/#2f2546cb16aa.

10. “The International Journal of Human ResourceManagement; Comparing traditional and virtual groupforms – identity, communication and trust in naturallyoccurring project teams: http://www.jimelwood.net/students/grips/man_group_comm/webster_wong_2008_traditional_virtual_group_forms.pdf

11. Journal of World Business, Creating and sharingknowledge within a transnational team—the developmentof a global business system: https://www.sciencedirect.com/science/article/pii/S1090951603000038

12. Checkpoint, 2017 The Growing Threat of Mobile Security Breaches: https://blog.checkpoint.com/wp-content/uploads/2017/04/Dimensional_Enterprise-Mobile-Security-Survey.pdf

13. Business Wire, IDG Global Mobile Survey Puts Spotlight On The Mobile Evolution: https://www.businesswire.com/news/home/20140630006098/en/IDG-Global-Mobile-Survey-Puts-Spotlight-Mobile.

14. Ponemon Institute, Sixth Annual Benchmark Study on Patient Privacy and Data Security: https://www.ponemon. org/local/upload/file/Sixth%20Annual%20Patient%20 Privacy%20%26%20Data%20Security%20Report%20 FINAL%206.pdf

15. eWeek Security, Small Businesses Unprepared for Data Loss- Lack Backup Policies: http://www.eweek.com/security/small-businesses-unprepared-for-data-loss-lack-backup-policies.

16. Deloitte Insights, The hidden costs of an IP breach-Cyber theft and the loss of intellectual property: https://www2.deloitte.com/insights/us/en/deloitte-review/issue-19/loss-of-intellectual-property-ip-breach.html

17. White Hat Security, 2017 Application Security Statistics Report: https://info.whitehatsec.com/rs/675-YBI-674/images/WHS%202017%20Application%20Security%20 Report%20FINAL.pdf

18. Financial Conduct Authority, FCA fines former investment banker for sharing confidential information over WhatsApp: https://www.fca.org.uk/news/press-releases/fine-former-investment-banker-sharing-confidential-information-whatsapp.

19. Harvard Journal of Law & Technology, 2014 Your secret stingray’s no secret anymore: The vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy: http://jolt.law. harvard.edu/articles/pdf/v28/28HarvJLTech1.pdf

20. Secure List, IT threat evolution Q2 2018. Statistics: https://securelist.com/it-threat-evolution-q2-2018-statistics/87170/.

21. Forbes, The GDPR Racket: Who’s Making Moneyfrom This $9bn Business Shakedown: https://www. forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/#5213a49e34a2.

15adeya.ch

14

Page 9: Private Enterprise App to Combat Costly Data Breaches and ... Papers/Adeya private enterpri… · almost half of British businesses are relying on consumer-grade software for their

www.adeya.ch

Find out more about how Adeya can help you meet regulatory requirements while growing

your enterprise B2B offerings and providing the apps that your employees need.

+41 22 566 14 90 [email protected] Saint-Louis 2, Morges, CH-1110, Switzerland

CONTACT US

STAY IN TOUCH