The US National Institute of Standards and Technology (NIST) and its National Cybersecurity Center of Excellence (NCCoE) published ahow-to guide titled ‘Mobile Device Security: Cloud and Hybrid Build’ for public and private companies to protect their mobile devices form data breaches by using commercially available technology. In general, it is a manual for network architects to ensure employees can access information remotely, while minimising security risks.
Cybersecurity is among the main concerns of governments, Internet users, technical and business communities. Cyberthreats and cyberattacks are on the increase, and so is the extent of the financial loss.
Yet, when the Internet was first invented, security was not a concern for the inventors. In fact, the Internet was originally designed for use by a closed circle of (mainly) academics. Communication among its users was open.
Cybersecurity came into sharper focus with the Internet expansion beyond the circle of the Internet pioneers. The Internet reiterated the old truism that technology can be both enabling and threatening. What can be used to the advantage of society can also be used to its disadvantage.