See also:When your workforce is all over the place, you need a VPN Mobile malware is on the rise and poses a serious threat to the security posture of mobile devices, warns IDC in its Mobile Security forecast . While infected Android applications have had the most press thus far, many users will also open up infected Web sites and unknowingly download malicious code that can take advantage of root-level exploits on the device. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Once a device is rooted, all other security measures that run on top of that are compromised. So enterprises should consider adding additional layers of security for insurance, says IDC. Virtual private networks aren’t the only way to secure the mobile workforce. There are two technologies that can have the ability to enhance mobile security offerings are GPS and virtualization. Contextually aware security An interesting idea is the use of GPS technology to provide contextually aware security. Using this technology, an administrator can set policies via device location so the software can recognize when the device is out of compliance and take action if necessary. For example, if the device goes outside its approved location (a retail store for instance), the device will recognize that it’s outside its approved GPS coordinates and lock. These types of features will be very interesting to certain vertical markets, such as retail, healthcare, or government. Virtualisation Virtualisation is another technology that stands to enhance mobile security. Currently, hypervisors can be deployed onto the device directly (at the chip level or above), allowing for partitioning of operating systems. For instance, on an individual-liable device virtualization would enable the phone to have one OS for business apps and another for personal information. In addition to providing a secure domain for enterprise applications and management/security software, depending on where in the phone stack the hypervisor sits, virtualization can actually protect the security software itself if the phone’s operating system becomes compromised. At present, mobile virtualisation solutions are mainly available for Android devices. Pic: bling_rockscc2.0 CIO Event: The CIO Big Conversation Consumerisation: How to manage the new era of mobility Date: Thursday 25th October 2012 Time: 6:30pm Location: The Mandarin Oriental Hotel, London To register for your place, email amie_lane@idg.co.uk Event Overview: The Big Conversation is a business technology leadership forum that brings IT leaders together to listen, share & shape opinions on the key issues the CIO community faces. The evening will include a keynote from a top CIO 100 speaker sharing his experiences on this topic, as well as the opportunity to share your views with fellow CIOs over networking drinks and canapés. Related content feature Gen AI success starts with an effective pilot strategy To harness the promise of generative AI, IT leaders must develop processes for identifying use cases, educate employees, and get the tech (safely) into their hands. By Bob Violino Sep 27, 2023 10 mins Generative AI Innovation Emerging Technology feature A fluency in business and tech yields success at NATO Manfred Boudreaux-Dehmer speaks with Lee Rennick, host of CIO Leadership Live, Canada, about innovation in technology, leadership across a vast cultural landscape, and what it means to hold the inaugural CIO role at NATO. By CIO staff Sep 27, 2023 6 mins CIO IT Skills Innovation feature The demand for new skills: How can CIOs optimize their team? By Andrea Benito Sep 27, 2023 3 mins opinion The CIO event of the year: What to expect at CIO100 ASEAN Awards By Shirin Robert Sep 26, 2023 3 mins IDG Events IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe