INTEROP 2014 Mobile Issues in the Network
Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware, etc. – Insecure computing practices Collaboration – Not physically connected to secure network – Consumer collaboration networks insecure
Data Loss Hardware failure – Protect via backups, cloud-based storage Malware – Protect via software, safe computing practices Data corruption – Protect as above
Data Theft and Leakage Hardware loss – Encrypt hard drives – Don’t store sensitive data on mobile devices – Remote wipe software and settings Data Espionage – Encrypt data on device and in transmission – Use privacy shields where possible – Protect against malware – Use safe computing practices Data Leakage – Separate secure from nonsecure IDs on shared devices – Use safe computing practices
Collaboration Sharepoint and other corporate solutions – Based on secure servers, sessions, and services – Data lie on secure servers Blacklist or wall off insecure cloud providers Protect sensitive data from being copied and/or transmitted elsewhere Encrypt sensitive data
Threat Vectors How do no-goodniks get into the network (or get the data)? – Malware – viruses, worms, spyware – Software exploits – back doors, bugs, vulnerabilities – Cyber eavesdropping and espionage – Social Engineering – phishing, pharming, etc. – Ads and unremovable pop-ups – Passwords and tokens stored on device Mobile Devices are just as vulnerable as computers are
Application Security Issues In-App Ads In-App Purchases Sideloaded Apps Bogus Apps Excessive Permissions
User Security Issues Shared devices with single ID/password Devices with no sign-on/password Using business devices over free Wi-Fi
Mobile Security Solutions – No longer limited to anti-malware – “Mobile” = Intended for Android, iOS, and other mobile devices – SoHo computer solutions still available from many vendors – Personal solutions may include App scanning Device security (device location, remote wipe, etc.) Backup/recovery
Enterprise Features App management – Push upgrades, remote wipe, whitelisting Authentication solutions – SecureID-like token-generating apps – Credentials management Device management – Location tracking, remote scanning, etc. All features of single-user editions
Security Software Providers Include Lookout (Android, iOS, Enterprise Mobile) Lookout Symantec (Android, iOS, Windows Phone, PC, Mac, Enterprise, Enterprise Mobile) Symantec Enterprise Mobile ESET (Android, PC, Mac, Linux*, SoHo, Business) ESET Vipre (Android, PC, iOS*, Mac*, Business) VipreBusiness Comodo (Android, PC, Mac, Linux, Business) Comodo *Business package only
Corporate Classified Information Android for Business Remote Wipe (most antimalware) Multiple Identities Cellrox
Whitepapers Don’t Lose the Data: Six Ways You May Be Losing Mobile Data and Don’t Even Know It – Symantec Don’t Lose the Data: Six Ways You May Be Losing Mobile Data and Don’t Even Know It Mobility Insight: 6 myths you can’t afford to ignore – HP Mobility Insight: 6 myths you can’t afford to ignore