IT-Analysis.com
IT-Analysis.com Logo
Business Issues Security & Risk
Business Issues Channels Enterprise Services SME Technology
Module Header
Louella FernandesLouella Fernandes
Louella Fernandes
22nd April - Internet of Things: A New Era for Smart Printing?
Simon HollowayThe Holloway Angle
Simon Holloway
18th April - Virgin Media expose private email addresses
Craig WentworthMWD Advisors
Craig Wentworth
17th April - Box's enterprise customers step forward to be counted
Craig WentworthMWD Advisors
Craig Wentworth
16th April - Egnyte the blue touchpaper...

Analysis

The Smartphone: a real bug in your bed (3)
Nigel Stanley By: Nigel Stanley, Practice Leader - IT Security, Bloor Research
Published: 21st February 2011
Copyright Bloor Research © 2011
Logo for Bloor Research

Finally what about smartphone management and how can you try and implement the raft of security policies you will need to manage an estate of these new gadgets?

There are a number of solutions that enable just this—the management of a large number of smartphones and similar devices across the business. Typically the organisation will want to manage their smartphones as they would any other device or computer attaching to the corporate network or accessing corporate resources. The use of a single management suite that aggregates all types of devices under one central tool is  probably the best approach, if you can find one that meets your requirements.

Will you permit users to use their own devices to access your systems? If so, will you permit all devices or only those that have been checked as secure by your security team? Users also need to be aware that if they are using their own devices to access corporate data then their devices may be seized for examination if there is an incident or data discovery requirement. This may deter some using their own devices to access corporate data.

You will then need to consider the use of apps and how, or if, these will be downloaded. After all, how can you be certain the apps that users download will not break your systems or introduce malware? These apps need to be policed. Finally, don’t forget to update your organisational information security policy to take into account use of mobile devices.

The solution(s)
There are a number of third party solutions emerging to the problem of smartphone security. Bloor Research has categorised them as follows:

  • End user smartphone security. This is the provision of security products that a user can install on their smartphone to deliver a degree of protection. Typically it will comprise anti-malware and anti-virus products similar to those found on desktop PCs
  • Smartphone management. These tools enable an estate of smartphones to be centrally managed. Typically this solution would be used in a large organisation.
  • Voice security. A neglected area of smartphone security. Due to the design of the mobile phone network smartphones are at risk of voice interception. [1] By installing and using a voice security product voice calls are encrypted. 
  • Data Security. The increasing use of smartphones to access corporate data means that additional data security is often needed to protect the data.
  • Security Management for Network Operators. Increasingly, network operators are seeing an opportunity to sell additional security services to their premium customers.

The smartphone, a real bug in your bed - summary
Cast one’s mind forward 20 years and it boggles at the depth and breadth of attacks our mobile phones will be subject to. In the meantime, anyone that conducts sensitive business using a mobile phone should seriously consider implementing the preventative measures discussed in this presentation.

As more and more people use their mobile phones to run their entire lives, hackers and others will focus their efforts on getting the information they need from these devices. In many respects attitudes towards mobile phone data security reflect those held 20 years ago towards the humble personal computer. Back then attacks were minimal, anti-malware was yet to become established and hacking was in its infancy. Now we are in a maelstrom of attacks against the PC using sophistication and scale we previously thought impossible.

References
[1] Stanley, N. Voice Data Security - An overview of cellular (mobile) phone interception. Bloor Research 2011 Available for download http://www.bloorresearch.com/research/Spotlight/2052/Voice-Data-Security.html

Advertisement



Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761
Email: