Feeds

How to stay out of big trouble from little devices

Beware the smartphone apocalypse

Security for virtualized datacentres

Here's the tricky thing about mobile security: the perfect storm of smartphone threats is always just over the horizon. Every couple of years, the vendors are up in arms about it and predict handheld apocalypse.

At the same time, we are seeing an unprecedented level of activity in the mobile space. Morgan Stanley analyst Mary Meeker predicts that smartphones sales will surpass those of PCs next year. They overtook notebook sales in 2008.

Pirate raid

Security firm McAfee says there has been a 46 per cent surge in malware targeting mobile devices over the past year. The Symbian operating system has been compromised more than the Android and Apple’s iOS.

At the beginning of March, Google pulled dozens of applications from its Android Market web site, after discovering that more than 50 apps had malware that could ruin the device. At least 50,000 users downloaded them before they could be pulled. All the apps were pirated versions of legitimate software, rebundled under new names.

One of the most telling aspects of McAfee’s report was the lack of separation between personal and business use for smartphones and tablets.

We tend to put all our data on these devices because they are regularly used and close at hand. The report said that on average, almost two-thirds of employees are accessing the corporate network with mobile devices.

What can you do to protect your mobile workforce? Simply banning all of the devices from connecting to your corporate network is one way round the problem, but it is akin to taking the engine out of the car to avoid crashing.

A more realistic solution is to use the phone’s built-in features, or better still buy a third-party solution to help you manage your mobile portfolio.

Don't forget the tablets

The National Institute Of Science and Technology (NIST) in the US has something to say on this. It issued guidelines on mobile device security three years ago, although such is the speed of industry developments that the coverage didn't include tablets. Nevertheless, its advice is useful at a broad level.

The guidelines acknowledge the difficulty of managing multiple device types in an organisation.

One way is to find a compromise between blocking everything and allowing all kinds of device onto the network. Specifying permitted device types at least allows the IT department to profile them and plan for their use.

Mandating user authentication via a PIN helps to prevent a device being compromised if it is lost or stolen, but other options should complement this.

Data wiping solutions remove sensitive data from a phone before determined attackers can extract it. The iPhone offers a feature that wipes the phone after ten incorrect password entries. MobileMe also offers remote data wiping, and there are third-party solutions for business users to manage this centrally.

Encrypting data is one way to protect sensitive assets on phones

Various vendors offer products that not only remotely wipe phone data, but also lock down stolen phones and automate patch management and imaging.

Encrypting data is one way to protect sensitive assets on phones, assuming that you can't prevent users from storing them there. Automatic encryption is built into iOS, although researchers have criticised its level of security, and Android’s Honeycomb build will also have it. However, a third-party solution offering some sort of digital wallet may be a safer route.

What a turn-off

Of course, basic common sense needs to be codified into a mobile security policy. Not lending devices to other people, not downloading unknown software, always using a secure password or PIN and similar measures must be formalised and drilled into users.

What is most interesting is that the NIST guidelines effectively advise minimising the functionality of the device. Turning off wireless interfaces when the device is not in use so that it does not automatically connect, not storing sensitive data on the phone, turning off all the apps people don't regularly use are all sensible precautions.

But they fly directly in the face of what mobile vendors and users really want. As we navigate the security landscape, that might be the ultimate challenge. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
iPAD-FONDLING fanboi sparks SECURITY ALERT at Sydney airport
Breaches screening rules cos Apple SCREEN ROOLZ, ok?
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
The British Museum plonks digital bricks on world of Minecraft
Institution confirms it's cool with joining the blocky universe
Turn OFF your phone or WE'LL ALL DI... live? Europe OKs mobes, tabs non-stop on flights
Airlines given green light to allow gate-to-gate jibber-jabber
Be your own Big Brother: Keeping an eye on Mum and Dad
All watched over by machines of loving grace
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.