IR on mobile devices
Mobile devices have proliferated in the modern workspace. Mostly, due to the adoption of Bring Your Own Device (BYOD) policies, employees are continually introducing personal computing devices, such as phones and tablets, to internal networks. Some of these devices are unsecured, and the ones that have some form of protection may not reach the level of protection that organizational devices are afforded. Furthermore, some organizations provide mobile phones and tablets to employees in a bid to achieve a more dynamic and mobile workspace. Nonetheless, mobile devices are increasingly being targeted by malicious actors.
Unlike other devices in the organization, such as computers and servers, mobile phones might not have adequate security tools to ward off attacks. Additionally, they are more unlikely to be exposed to scrutinous security checks or initiatives such as penetration testing. This leads to the possibility of the existence of security gaps that...