4 Strategies To Lower Mobile Device Risk

  /     /     /  
Publicated : 22/11/2024   Category : security


4 Strategies To Lower Mobile Device Risk


Employees want their own phones, and managers want them using apps for productivity. Your problem: Secure all this.



Look around, and youll likely agree that end-user computing is taking its most radical turn since, well, the introduction of end-user computing.
Smartphones and now the iPad and tablet computers (which create similar challenges for mobile security) are growing like mad. To put some numbers on that growth: Smartphones accounted for 46% of global mobile phone revenue in the second quarter of last year, Infonetics research finds. It estimates that two out of three mobile subscribers in developed countries will use smartphones by 2014.
Mass-market smartphone ownership is creating new expectations from employees. Apples and Googles offerings trump the BlackBerry platform, the enterprise standard, because people think they can be both serious (for business) and fun (for me).
2010 also brought the first truly practical hyper-mobile computer--something larger than a smartphone but smaller than a PC. The iPad and its tablet followers have obvious appeal to people, many of whom are wondering if they can replace their work computer some of the time, feeding those work-anywhere, play-anywhere fantasies. This months Consumer Electronics Show illustrates the tablet frenzy Apple ignited with its wildly successful iPad, introduced only a year ago. New tablets are promised from Motorola, Research In Motion, Samsung, Dell, and even newcomers such as TV maker Vizio. Verizon has had the iPad on its network, and now has the iPhone 4 as well.
So the competition for mobile hearts and minds and pinch-and-tap fingers is in full swing, which means your employees will be showing up with more and more new devices. Employees want access to corporate resources and data via these new devices, many of which they personally own. Of utmost concern to any compliance-minded CIO should be: Are these new computing methods putting my data at risk? The answer is likely yes if youre leaving device settings up to the users. As well discuss, the risks of both smartphones and tablets can be managed in much the same way; its just a matter of defining your requirements, picking a capable management product, and moving forward. Well offer four frameworks for managing the risks of these mobile devices.
But first some important context. The megatrend is a shift beyond simple e-mail on these mobile devices. First driven by the iPhone, and now by the iPad, apps are the new frontier, with enterprise examples that include CRM, virtual desktop access (check out VMwares VDI infrastructure), and specialty apps.
Apps fall into two big categories, says Ojas Rege, CEO of mobile device management (MDM) vendor MobileIron. Theyre either task-oriented with broad appeal, such as those for time sheets, expense reports, and conference room scheduling; or theyre specialty apps for a niche audience. Some of those specialty apps are custom-coded for a companys specific business processes.
For example, Customedialabs, an interactive media agency, produces a digital sales app for the medical device and diagnostics industry. Using a client app that regularly syncs with a back-end data repository, the mobile app helps clients cover sales territories using CRM components, while trying to ensure that reps show prospects only the latest medical information. This cuts the risk of providing out-of-date material, a violation of stringent FDA Part 11 rules.
Its just one example of how, with apps, weve left the safe confines of e-mail far behind.
Reducing Mobile Device Risks To Enterprise Data

Become and
InformationWeek Analytics
subscriber and get our
full report on reducing enterprise risk
from mobile devices.
This report includes practical advice on charting CIO-level strategies for securing mobile devices.
Get This
And
All Our Reports
Their Phone, Your Problem
Another problem for the CIO is who owns the device. Its possible for companies, particularly highly regulated and deep-pocketed ones, to insist that employees use only company-issued smartphones by issuing only authorized and tested BlackBerry models backed by the trusted BlackBerry Enterprise Server.
However, taking that approach hasnt kept employees who dont qualify for a BlackBerry--and even those who do--from knocking on ITs door brandishing their own shiny iPhone or Droid device and saying, I want to use this to access the companys network. And whos to argue, really, if an employee is asking to be more available and more productive? Look for companies to continue migrating away from issuing standard smartphones. Instead, theyll provide smart management of enterprise data thats housed within personally owned mobile devices, regardless of platform.
Again, the compliance-minded CIO who allows the use of personal devices for business purposes must have a plan to mitigate the risks of sensitive company data, from personally identifiable customer data to proprietary technical information, being disclosed. This holds for any mobile device thats permitted access--whether to e-mail, a VPN connection to the internal network, access to an internal app or Web app, or access to remote desktop servers.
Theres a big sticking point, though, in providing security for personal devices accessing work information. The amount of control you exert may cause problems. If, for example, you enforce a device wipe policy after 10 failed authentication attempts, and someones 9-year-old tries to guess her dads password 11 times, guess what? That phone or tablet just got wiped. So when evaluating mobile device management, we recommend flexible policies that safeguard enterprise data while not necessarily affecting personal data.
This is an entirely different story if it involves company-owned devices, where you can be as draconian as you want to be. Below, we offer four broad strategies CIOs can use to build a mobile device security strategy, covering basic device management, enhanced device management, walled garden, and risk-based management.
Approaches For Lowering Risk
Basic device management includes rudimentary security such as device wipe, lock, and authentication policies. You can push basic policy settings through Microsofts ActiveSync, the most ubiquitous one-stop shop for basic control. But if you want enhanced control options, you need to pick a mobile device management vendor that supports all the popular platforms. Enhanced options vary widely depending on the MDM vendor and the platforms you intend to control, but all offer finer device control settings than one gets with the platform basics.
A third option can be described as a walled-garden approach, which builds a hard barrier between personal data and enterprise data. Veteran MDM provider Good Technology does exactly that, for such security-conscious organizations as the U.S. Army. If a company uses Goods software, anytime an employee interacts with the corporate system, it runs through Goods FIPS 140-2 encrypted application container, explains Dimitri Volkmann, Goods product management VP. With a similar look and feel across mobile platforms, the walled garden for business data includes corporate e-mail, calendar, and contacts, with other capabilities in development. Users enter the container that is owned by the enterprise, leaving all other device functions personal. Should the company decide to revoke container access, IT can flag the container for deletion next time it connects. Problem solved.
Its the fourth option, however, that is most interesting: risk-based device management. A strict device lockdown policy doesnt work as well on smartphones and tablets as it does on laptops because people expect a certain amount of freedom to use the phone or tablet as it was intended, MobileIrons Rege says. Instead, IT should monitor device risk levels--if the device is jailbroken, unauthorized apps are installed, policies are out of date, or data protection is disabled. The consequence: Enterprise data access is limited or revoked.
4 Mobile Security Strategies
Basic device management
Use Microsoft Activesync for simple policy management. Enhanced device management
Use mobile device management software for more sophisticated control of company-issued devices. Walled garden
Allow corporate access from personal devices, but wall it off from the devices personal content. Risk based management
Set policies that restrict corporate access of phones with high risk factors, like unauthorized apps or out-of-date policies.
MobileIrons risk determination system can look at whether the hardware itself meets certain cryptographic standards. For example, iPhone 3G units arent encrypted at the hardware level, whereas 3GS and newer version are. Knowing whether devices are encrypted could be important because, if not, data cached on the phone could be disclosed if a phone is lost and falls into the wrong hands.
This risk-based approach interests us more than the walled garden one in part because of the rise of customized and specialty apps. The risk-based approach doesnt change how the phone operates, and it permits the installation of specialty apps, whether theyre generally available or available only from an enterprises own private app store. Being able to allow app installation is highly valuable if you have custom apps, since they dont need to integrate with the walled garden. Also, if a user exceeds the device risk standard by changing a setting, the custom app can be prevented from working until the user reverses the change.
Most of the mobile device management approaches rely on centralized policy. The risk-based approach is no different. Authorized devices receive a software agent that communicates periodically with its management system. The policies defined centrally are implemented at the device via the agent. Therefore, its the agent determining whether access to the enterprise data will be permitted if the user has made a change.
Real-World Risk Scenarios
Here are a few operational scenarios for a risk-based system. Lets assume that your company maintains two device groups, employee-owned and company-owned. IT sets different policies for each:
>> If any device is jailbroken or rooted, it immediately loses access to e-mail, and IT is notified to make a decision on whether to wipe. This is an extreme situation warranting a decisive response.
>> If a company-owned device has certain applications on it that violate acceptable use policies--for example, games, inappropriate content, even music--the user and IT are automatically notified, and the employee is given a chance to back out the change. Until then, the device cant access corporate resources.
>> If an employee-owned device has the same apps or content on it, perhaps no action is taken. But these devices may have less access to data than the company-owned devices.
>> If the device (lets assume its based on iOS) has a passcode and thereby has enabled data protection, apps with proprietary information are made available for the user to download from the private enterprise app storefront--for example, an app that lets the user review specs for the latest engineering project. If theres no data protection enabled, then that app doesnt even appear in the users app catalog.
Mobile device management is a challenge as our perimeters become harder to define. The innovative CIO will turn this challenge into a business opportunity--show that IT can help people be more connected and collaborative, regardless of location. When executed correctly, letting employees use their own devices, regardless of platform, to securely access enterprise data saves money--and wins friends and allies. And if safeguards are built in, conversations with auditors come much easier--youre able to prove that risks are addressed appropriately.
Grant Moerschel is co-founder of WaveGard, a technology consulting firm. Write to us at [email protected].
Download a free PDF of
InformationWeek
magazine
(registration required)

Last News

▸ New threat discovered: Mobile phone ownership compromised. ◂
Discovered: 23/12/2024
Category: security

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
4 Strategies To Lower Mobile Device Risk