Feeds

How to stay out of big trouble from little devices

Beware the smartphone apocalypse

The essential guide to IT transformation

Here's the tricky thing about mobile security: the perfect storm of smartphone threats is always just over the horizon. Every couple of years, the vendors are up in arms about it and predict handheld apocalypse.

At the same time, we are seeing an unprecedented level of activity in the mobile space. Morgan Stanley analyst Mary Meeker predicts that smartphones sales will surpass those of PCs next year. They overtook notebook sales in 2008.

Pirate raid

Security firm McAfee says there has been a 46 per cent surge in malware targeting mobile devices over the past year. The Symbian operating system has been compromised more than the Android and Apple’s iOS.

At the beginning of March, Google pulled dozens of applications from its Android Market web site, after discovering that more than 50 apps had malware that could ruin the device. At least 50,000 users downloaded them before they could be pulled. All the apps were pirated versions of legitimate software, rebundled under new names.

One of the most telling aspects of McAfee’s report was the lack of separation between personal and business use for smartphones and tablets.

We tend to put all our data on these devices because they are regularly used and close at hand. The report said that on average, almost two-thirds of employees are accessing the corporate network with mobile devices.

What can you do to protect your mobile workforce? Simply banning all of the devices from connecting to your corporate network is one way round the problem, but it is akin to taking the engine out of the car to avoid crashing.

A more realistic solution is to use the phone’s built-in features, or better still buy a third-party solution to help you manage your mobile portfolio.

Don't forget the tablets

The National Institute Of Science and Technology (NIST) in the US has something to say on this. It issued guidelines on mobile device security three years ago, although such is the speed of industry developments that the coverage didn't include tablets. Nevertheless, its advice is useful at a broad level.

The guidelines acknowledge the difficulty of managing multiple device types in an organisation.

One way is to find a compromise between blocking everything and allowing all kinds of device onto the network. Specifying permitted device types at least allows the IT department to profile them and plan for their use.

Mandating user authentication via a PIN helps to prevent a device being compromised if it is lost or stolen, but other options should complement this.

Data wiping solutions remove sensitive data from a phone before determined attackers can extract it. The iPhone offers a feature that wipes the phone after ten incorrect password entries. MobileMe also offers remote data wiping, and there are third-party solutions for business users to manage this centrally.

Encrypting data is one way to protect sensitive assets on phones

Various vendors offer products that not only remotely wipe phone data, but also lock down stolen phones and automate patch management and imaging.

Encrypting data is one way to protect sensitive assets on phones, assuming that you can't prevent users from storing them there. Automatic encryption is built into iOS, although researchers have criticised its level of security, and Android’s Honeycomb build will also have it. However, a third-party solution offering some sort of digital wallet may be a safer route.

What a turn-off

Of course, basic common sense needs to be codified into a mobile security policy. Not lending devices to other people, not downloading unknown software, always using a secure password or PIN and similar measures must be formalised and drilled into users.

What is most interesting is that the NIST guidelines effectively advise minimising the functionality of the device. Turning off wireless interfaces when the device is not in use so that it does not automatically connect, not storing sensitive data on the phone, turning off all the apps people don't regularly use are all sensible precautions.

But they fly directly in the face of what mobile vendors and users really want. As we navigate the security landscape, that might be the ultimate challenge. ®

Boost IT visibility and business value

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Apple to build WORLD'S BIGGEST iStore in Dubai
It's not the size of your shiny-shiny...
Just in case? Unverified 'supersize me' iPhone 6 pics in sneak leak peek
Is bigger necessarily better for the fruity firm's flagship phone?
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?