Spam’s Hidden Victims: Mobile Users

01.09.2009

But technology alone won't cure the problem. Users must become involved in the security process for a mobile security strategy to be successful. By educating users about potential threats and providing tools to avoid them, IT managers will be able to better mitigate spam attacks and the associated consequences.

Topics to discuss with users include the potential security risks associated with spam, how to identify phishing attempts in the mobile environment, and ways to moderate security risk. Users that proactively manage their personal network of contacts (i.e. manage who they distribute contact information to, what they open, and what they respond to) will inherently be able to operate in a more secure environment.

Industry trends are aligning with this thinking. In a recent report from the (MAAWG), , the group offered a number of recommendations to combat spam, and first and foremost is involving users in the security process. The report offers a number of suggestions, including educating users on reporting spam, identifying and handling false positives, and taking advantage of spam reporting capabilities.

By implementing a user-education component within your mobile security strategy, users can serve as the resource closest to the problem, rather than as a potential liability within an effective strategy.When taken together, these steps will allow you to not only address the security threats mobile users are facing today, but begin preparing for those we will surely face in the future. These measures will also preserve the benefits that enterprise smartphone users have come to depend on.