Feeds

Mobile Clinic: How do you make mobile data secure?

Keeping it safe

  • alert
  • submit to reddit

3 Big data security analytics techniques

Ed Moore, OpenWeb Product Manager, Openwave Europe
www.openwave.com

Mobile data security is a many-headed Hydra; with a variety of potential issues to be addressed under the single banner. Mobile also covers a variety of potential access devices, from laptops down to phones and even internet cafes, all of which have to be addressed.

Securing data on laptops and phones

Any device with more than just a contact list and browser should have security measures mandated. For non-sensitive work a password and rotation policy is sufficient, but for personal data records or sensitive business data then data encryption technology must be used as well.

Tracking services should also be considered; these will trace the device after being stolen so that remote deletion can be triggered or the unit retrieved.

Finally, if a mobile is being used for collecting or generating primary data (as opposed to copying data from a centralised system) synchronisation/centralised backup software can be used too. This should minimise the possibility that valuable data can be lost through theft or accident.

Protection against attack

Viruses, Trojans and Phishing attacks can all attack mobile devices and laptops or smartphones can be especially sensitive to these, as they can be taken outside of your corporate network, which may provide a degree of security at the network edge.

All devices should have anti-virus protection and ideally be configured to use a corporate (but external) security proxy for general internet access. This may not be possible in all cases, but will help give the most complete protection. The problem can be resolved in an alternative manner; by specifying standard phones for data access; with a closed platform it is much more difficult to suffer a meaningful attack.

Securing corporate communications

Always encrypt the traffic to a corporate network, SSL or IPSec encryption is common to all mobiles these days and there's no excuse not to make this a policy. Encryption can be used at a single application level or to secure the whole data pipe, but any application with automated log-on needs to be watched particularly carefully. Apply passwords and ensure these are used when establishing a connection, otherwise anyone can quickly gain access. A two-factor authentication service may be needed for added protection.

Stealing corporate secrets

There's always the potential for a staff member to use a mobile device to transport company secrets away from the office. Laptops have enormous storage capacity these days and usually CD burners and Wi-Fi connections too, to compound the problem. Logging and tracking software can help provide some security, but in reality this is just covering up the problem. Concentrate HR on keeping the staff happy instead!

Final Recommendations

Simplify the problem; use standard handsets if at all possible with browser access to corporate applications. Don't store locally and don't enable viruses.

Standardise wherever possible; same handsets, laptops, security software, and encryption technique. Proliferation always lessens effectiveness.

Consider all angles; you'll end up with a more comprehensive policy because of it. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE & Vodafone will let you BONK on the TUBE – with Boris' blessing
Transport for London: You can pay, but don't touch
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.