Drew Robb in his article ” How to Secure Mobile Devicesโ€ has created an excellent guide to thinking about the security of mobile devices, not just for consumers but for the enterprise.

The article is recreated below:

โ€œMore and more frequently, employees are linkedย to sensitive data via a number of differentย devices, providers, and operating systems,โ€ said Will Hedrich, a security architect at CDW-G. โ€œIf laptops, tablets, and smartphones are left unattended for even a few minutes, you are at risk.โ€

Anyone can download an application for $50 to $150, for example, that will allow them to listen to phone conversations, listen to anything around that phone even when itโ€™s not on a call, view the camera, swipe files from the phone, or access the corporate network. They can download, view, or listen to this information wirelessly using the phoneโ€™s public IP address, Bluetooth or Wi-Fi. After the program is downloaded on to it, the person would never know it is on his or her phone.

Recently, for example, an employee of a large enterprise left a smartphoneย in the car while shopping. The phone, which was stolen, contained the social security numbers and other personal information of company employees. Because the phone was not equipped with any security measures, the information was easily accessed.

Most company employees do not even have basic firewall or password protections on their phones, so they are risking this kind of data loss on a regular basis.

The financial consequences can beย severe. The government fines companies $204 or more per piece of personal information leaked, such as a social security number, credit card information, and other personally identifiable information (PII) or payment card industry (PCI) compliance information.

โ€œIt is important to have a mobile management security strategy in place to prevent data loss and malicious attacks,โ€ said Hedrich. โ€œThe strategy should extend to devices, the data center, and cellular carriers.โ€

He added that a comprehensive solution for locking down the mobile workforce did not exist until recently. Such solutions, now becoming available from a variety of vendors, should encompass a four-pronged approach.

Physical security

Devices accessing the network need data encryption and multi-factor authentication, which includes a user name, password, and a series ofPINnumbers, such as a four digit personalPINandย a six digit code that is generated automatically and changes every minute. Device certificates are also important.

Content security

If appropriateย security protocols are in place, anyone trying to accessย information via the public IP address of an encrypted device will find that the information is completely scrambled. A combination of anti-malware, content filtering, encryption, data loss prevention (DLP) software, and intrusion prevention software installed on all devices will prevent unauthorized access to data.

โ€œIf a phone, tablet, or other device falls into the wrong hands, you want to beย sure that data on it cannot be accessed,โ€ said Hedrich. โ€œData encryption and multi-factor authentication are crucial to ensuring that only the authorized user can access the information on the device.โ€

Device management

Organizations should also set access levels and permissions for each person or group on the network, such as legal, marketing, IT, etc. These access policies control the data they can accessย via their devices and the functions they can perform remotely.

โ€œCentralized device management allows IT to update access rights as well as roll out updates to operating systems and applications from one central console,โ€ said Hedrich. โ€œAnd, if a device is lost or stolen, the IT manager can wipe the device remotely to prevent data loss.โ€

.


6 responses to “How to Secure Mobile Devices”

  1. Is “Secure Mobile” an Oxymoron? | Infosec Communicator Avatar

    […] How to Secure Mobile Devices (brianpennington.co.uk) […]

    Like

  2. hackingas…

    […]How to Secure Mobile Devices « Brian Pennington[…]…

    Like

  3. Lynna Avatar

    Where is the facebook like link ?

    Like

  4. Doreatha Avatar

    Thank you for taking the time to explain the terminlogy to the learners!

    Like

  5. Bryson Avatar

    Well done article that. I’ll make sure to use it wsiley.

    Like

  6. Are security rules are bent for the iPad? | Business Computing World Avatar

    […] devices as the iPad bring huge benefits into the enterprise, but security has to be maintained. Legally, it is actually quite simple, as an associate at Taylor Wessing law firm pointed […]

    Like

Leave a comment