{"id":1243,"date":"2019-07-22T15:52:14","date_gmt":"2019-07-22T13:52:14","guid":{"rendered":"http:\/\/65.108.60.219\/?p=1243"},"modified":"2025-05-26T19:45:22","modified_gmt":"2025-05-26T17:45:22","slug":"mobile-security-in-a-business-environment","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment","title":{"rendered":"Mobile security in a business environment"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Whether we like it or not, BYOD (Bring Your Own Device) is here to stay. Long-gone are the days of IT managers making company-wide decisions when it comes to preferred mobile platforms. Today almost everyone uses their own mobile device in a work environment \u2013 whether the IT department is aware of that or not.<\/span><\/p>\n<h2><b>Background<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Roughly ten years ago, the IT administrator could roll-out Blackberry devices across the entire company, providing appropriate mobile solutions for everyone: from a line worker in a factory, to the CFO and CEO. Administration was centered around the Blackberry Enterprise Server and it appeared that the mobile revolution entered the corporate world from a top-down perspective.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That all changed with the iPhone. Steve Jobs walked onto the stage with a new, shiny gadget that awed the crowd with its unadulterated simplicity. Web browsing, mail \u2013 it all simply worked.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not too long after that, many end-users brought their Apple devices into the corporate environment and demanded their favorite phone had all the same business capabilities as the old BlackBerry devices. As the history tells us, ultimately they won. IT departments, although reluctant at first, embraced the user\u2019s demands and produced plugins, integrations and other means for Apple devices to access the features of the business network. This was a truly bottom-up process, where the users brought technology into the business world, rather than the business providing the technology for their employees. And so as such, the era of BYOD was born.<\/span><\/p>\n<h2><b>BYOD today<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">From the perspective of the corporate IT departments, BYOD usually means a security nightmare, or additional work, at least. First, it\u2019s important to point out that user\u2019s devices are inherently outside the control of the IT administrator. Although there are certain security platforms and measures that an IT admin can take in order to gain some control over the devices, but the fact of the matter is that most users will use their phones as they please: they may install new apps, change the security configuration, or worst \u2013 side-load unknown applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Second, there\u2019s a multitude of different vendors, each supplying their own pre-loaded applications. Most often this bloatware is there to provide vendor-specific functionality, up-sell additional services or to subsidize the low price of the device by displaying advertisements on the user\u2019s screen. Oftentimes security is not the highest priority \u2013 and that\u2019s unfortunate \u2013 especially given the fact that most pre-loaded apps cannot be disabled or un-installed without first rooting the device (which in turn, voids the warranty of most products). Moreover, as a recent academic study outlines, these apps often bypass security measures of Android and the Google Play platform \u2013 by allowing far more data permissions than the app functionality requires.<sup> 1<\/sup><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having the BYOD security risks in mind, IT departments responded in a variety of ways. Some departments chose to have a separate VLAN for non-corporate devices, therefore limiting their access to only a few network services. Others heavily invested in mobile administration platforms, which provide a certain level of security, albeit require extensive maintenance on the part of the administrator. Other companies flat-out tried to ban outside devices from entering their network, asking the employees to utilize only company-provided smartphones and tablets \u2013 although with a limited success due to what can be dubbed as \u2018the human behavior factor\u2019.<\/span><\/p>\n<h2><b>The human behavior factor<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The human behavior factor is something that cannot be easily fixed by technology. According to a recent Samsung Mobile Workplace study, about 55% of lower and middle-tier employees utilize their corporate smartphones as their personal devices<sup> 2<\/sup>.<\/span><span style=\"font-weight: 400;\"> They install additional applications, load personal files and side-load apps which otherwise would have been rejected on security grounds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If one were to think that higher-level managers are free from making this mistake, one would be very misled. According to the same study, one-third of higher-level managers are guilty of the same security breaches.<sup> 3<\/sup><\/span><span style=\"font-weight: 400;\"> As such, it can be inferred that regardless of official rules and company policies, out of convenience or multitude of other factors, people fall into the same behavioral patterns \u2013 and there\u2019s very little that the IT department can do about it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Meanwhile, the 2019 IDG <\/span><i><span style=\"font-weight: 400;\">Buying into Mobile Security<\/span><\/i><span style=\"font-weight: 400;\"> whitepaper sums up the need to address this problem. According to their study based on top 100 IT leaders and IT security executives (49% were CIOs) from a cross-section of industries including high tech, financial services and manufacturing, with an average employee base of 23000, 74% of respondents report their organizations have experienced a data breach as a result of a mobile security issue.<sup> 4<\/sup><\/span><span style=\"font-weight: 400;\"> Moreover, as IDG whitepaper outlines, these data breaches have been caused by the following: <\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\">Mobile apps containing malware, <\/span><\/li>\n<li><span style=\"font-weight: 400;\">Apps that contained security vulnerabilities, <\/span><\/li>\n<li><span style=\"font-weight: 400;\">Unsecured Wi-Fi connections.<\/span><\/li>\n<\/ol>\n<h2><b>Problem \u2192 Solution<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">As with any security-oriented problem, there is no solution which can 100% guarantee corporate network security. However, with a few good practices, we can get closer to that percentage.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">First, it\u2019s important to invest in knowledge of our employees.<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">According to Citrix, by 2020, 50% of the workforce will be remote<sup> 5<\/sup>.<\/span><span style=\"font-weight: 400;\"> Having that said, one can easily infer that whether we like it or not, BYOD or remotely-connected devices are here to stay.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even with the best software security solutions implemented company-wide, there\u2019s no way to rule out the human factor, as denying one feature will simply cause the user to find another. In a way, it\u2019s a cat-and-mouse game. However, proper security training is by far one of the most effective solutions for raising security awareness<sup> 6<\/sup>.<\/span><span style=\"font-weight: 400;\"> The <\/span><i><span style=\"font-weight: 400;\">Best Practices for Implementing a Security Awareness Program <\/span><\/i><span style=\"font-weight: 400;\">by PCI Security Standards provides an excellent outline of topics to cover.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Second, audit your devices.<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Sometimes even brand-new devices come with malware or insecure applications pre-installed<sup> 7<\/sup>.<\/span><span style=\"font-weight: 400;\"> One of the best ways to counter this problem is to simply check the amount of pre-installed applications on our devices, as well as their permissions. If possible, it\u2019s a good idea to disable unknown or unnecessary applications. If this is not an option, limiting the app permissions and mobile data access in Android settings can be a step up. Best practice, however, is purchasing devices which do not come with modified UI or vendor applications pre-installed.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Last, but not least, monitor your network.<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">As there is no way to completely rule out the chances of a human error, it\u2019s always a good idea to utilize proactive monitoring measures to quickly identify and quarantine security breaches. With the proper network monitoring software and a clear security policy, the administrator can create a baseline of network behavior, monitor for anomalies and set up scripts which will automatically\u00a0<\/span><span style=\"font-weight: 400;\">suspend or limit the offending user device or account, until the problem is examined and resolved.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><span style=\"font-weight: 400;\">Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, Narseo Vallina-Rodriguez. <\/span><i><span style=\"font-weight: 400;\">An Analysis of Pre-Installed Android Software<\/span><\/i><span style=\"font-weight: 400;\">. IMDEA Networks Institute, Universidad Carlos III de Madrid, Stony Brook University, ICSI.<br \/>\n<\/span><a href=\"https:\/\/haystack.mobi\/papers\/preinstalledAndroidSW_preprint.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">\/https:\/\/haystack.mobi\/papers\/preinstalledAndroidSW_preprint.pdf<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.telepolis.pl\/wiadomosci\/prawo-finanse-statystyki\/ponad-polowa-pracownikow-uzywa-telefonu-sluzbowego-jak-prywatnego\" target=\"_blank\" rel=\"noopener\">https:\/\/www.telepolis.pl\/wiadomosci\/prawo-finanse-statystyki\/ponad-polowa-pracownikow-uzywa-telefonu-sluzbowego-jak-prywatnego<\/a><\/li>\n<li><a href=\"https:\/\/www.telepolis.pl\/wiadomosci\/prawo-finanse-statystyki\/ponad-polowa-pracownikow-uzywa-telefonu-sluzbowego-jak-prywatnego\" target=\"_blank\" rel=\"noopener\">https:\/\/www.telepolis.pl\/wiadomosci\/prawo-finanse-statystyki\/ponad-polowa-pracownikow-uzywa-telefonu-sluzbowego-jak-prywatnego<\/a><\/li>\n<li><span style=\"font-weight: 400;\">Buying into Mobile Security: \u201cMobile security investments are becoming a priority for CIOs as the lack of visibility into mobile devices continues to increase risk.\u201d IDG, 2019. PDF. <\/span><\/li>\n<li><a href=\"https:\/\/www.citrix.com\/perspectives-by-citrix\/innovation\/future-of-work-how-you-unlock-innovation-anywhere.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.citrix.com\/perspectives-by-citrix\/innovation\/future-of-work-how-you-unlock-innovation-anywhere.html<\/a><\/li>\n<li><a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/PCI_DSS_V1.0_Best_Practices_for_Implementing_Security_Awareness_Program.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.pcisecuritystandards.org\/documents\/PCI_DSS_V1.0_Best_Practices_for_Implementing_Security_Awareness_Program.pdf<\/a><\/li>\n<li><span style=\"font-weight: 400;\">Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, Narseo Vallina-Rodriguez. <\/span><i><span style=\"font-weight: 400;\">An Analysis of Pre-Installed Android Software<\/span><\/i><span style=\"font-weight: 400;\">. IMDEA Networks Institute, Universidad Carlos III de Madrid, Stony Brook University, ICSI.<br \/>\n<\/span><a href=\"\/\/haystack.mobi\/papers\/preinstalledAndroidSW_preprint.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">\/https:\/\/haystack.mobi\/papers\/preinstalledAndroidSW_preprint.pdf<\/span><\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Whether we like it or not, BYOD (Bring Your Own Device) is here to stay. Long-gone are the days of IT managers making company-wide decisions when it comes to preferred mobile platforms. Today almost everyone uses their own mobile device in a work environment \u2013 whether the IT department is aware of that or not. [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[29,37],"tags":[],"class_list":["post-1243","post","type-post","status-publish","format-standard","hentry","category-security","category-guide"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile security in a business environment - CyberForces<\/title>\n<meta name=\"description\" content=\"Mobile security - best practices to rule out cyberthreats coming from the inside. Is there anything better than proper employees education?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile security in a business environment\" \/>\n<meta property=\"og:description\" content=\"Check our article on how to face the danger that the BYOD trend may cause and keep your business secured.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-22T13:52:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-26T17:45:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/07\/BYOD-eng.jpg?wsr\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pawe\u0142 Wa\u0142uszko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/07\/BYOD.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pawe\u0142 Wa\u0142uszko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment\"},\"author\":{\"name\":\"Pawe\u0142 Wa\u0142uszko\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/12153b64ec1142a80a25bcc96b281a8e\"},\"headline\":\"Mobile security in a business environment\",\"datePublished\":\"2019-07-22T13:52:14+00:00\",\"dateModified\":\"2025-05-26T17:45:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment\"},\"wordCount\":1251,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"articleSection\":[\"Security\",\"Guide\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment\",\"url\":\"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment\",\"name\":\"Mobile security in a business environment - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"datePublished\":\"2019-07-22T13:52:14+00:00\",\"dateModified\":\"2025-05-26T17:45:22+00:00\",\"description\":\"Mobile security - best practices to rule out cyberthreats coming from the inside. Is there anything better than proper employees education?\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile security in a business environment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/12153b64ec1142a80a25bcc96b281a8e\",\"name\":\"Pawe\u0142 Wa\u0142uszko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr\",\"caption\":\"Pawe\u0142 Wa\u0142uszko\"},\"description\":\"Business Development Manager i Ekspert ds. Bezpiecze\u0144stwa. Do\u015bwiadczony mened\u017cer w bran\u017cy IT, kt\u00f3ry swoje do\u015bwiadczenie zdobywa\u0142 m.in. w Dolinie Krzemowej; entuzjasta oprogramowania open - source.\",\"url\":\"https:\/\/cyberforces.com\/en\/author\/pwaluszko\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile security in a business environment - CyberForces","description":"Mobile security - best practices to rule out cyberthreats coming from the inside. Is there anything better than proper employees education?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment","og_locale":"en_US","og_type":"article","og_title":"Mobile security in a business environment","og_description":"Check our article on how to face the danger that the BYOD trend may cause and keep your business secured.","og_url":"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2019-07-22T13:52:14+00:00","article_modified_time":"2025-05-26T17:45:22+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/07\/BYOD-eng.jpg?wsr","type":"image\/jpeg"}],"author":"Pawe\u0142 Wa\u0142uszko","twitter_card":"summary_large_image","twitter_image":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/07\/BYOD.jpg","twitter_misc":{"Written by":"Pawe\u0142 Wa\u0142uszko","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment"},"author":{"name":"Pawe\u0142 Wa\u0142uszko","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/12153b64ec1142a80a25bcc96b281a8e"},"headline":"Mobile security in a business environment","datePublished":"2019-07-22T13:52:14+00:00","dateModified":"2025-05-26T17:45:22+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment"},"wordCount":1251,"commentCount":0,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"articleSection":["Security","Guide"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment","url":"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment","name":"Mobile security in a business environment - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"datePublished":"2019-07-22T13:52:14+00:00","dateModified":"2025-05-26T17:45:22+00:00","description":"Mobile security - best practices to rule out cyberthreats coming from the inside. Is there anything better than proper employees education?","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/mobile-security-in-a-business-environment#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"Mobile security in a business environment"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/12153b64ec1142a80a25bcc96b281a8e","name":"Pawe\u0142 Wa\u0142uszko","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/06\/Pawel_Waluszko-7-2-100x100.png?wsr","caption":"Pawe\u0142 Wa\u0142uszko"},"description":"Business Development Manager i Ekspert ds. Bezpiecze\u0144stwa. Do\u015bwiadczony mened\u017cer w bran\u017cy IT, kt\u00f3ry swoje do\u015bwiadczenie zdobywa\u0142 m.in. w Dolinie Krzemowej; entuzjasta oprogramowania open - source.","url":"https:\/\/cyberforces.com\/en\/author\/pwaluszko"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=1243"}],"version-history":[{"count":8,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1243\/revisions"}],"predecessor-version":[{"id":252811,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1243\/revisions\/252811"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=1243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=1243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=1243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}