Tips to Increase Your Mobile Security

Contributor: Niamh Madigan
Posted: 10/21/2013
Tips to Increase Your Mobile Security
Rate this Article: 
Be the first!

Whilst lost devices raise serious privacy concerns websites are successfully being attacked on a daily basis. This at a time when Bring Your Own Device (BYOD), longer value chains and a bigger diversity in devices, protocols and file formats generate more risk to your enterprise.

Michel De Goede, Strategy Consultant and Enterprise Architect at Alliander has put together some tips on how to enhance your security while keeping your budget low!

Krank down on rogue employees

41% of IT Security professionals view rogue employees as their biggest risk against 31% who blame malware and targeted cyber-attacks.(1) These employees may be employed by your organisation, or be working in the capacity of subcontractors or temping.

This image shows the type of crimes that staff may engage in:

medium_Image1_ArticleOct.png

(source: Spotlight On Insider Threat from Trusted Business Partners (2012), CERT)

External cyber attacks may target staff

Organised criminals will go for easy money and easy victims where the numbers make up for the lower quantity of gain per victim. Who hasn't seen a bank scam asking to fill out account number and pin code? If you didn't, chances are that your staff's mobile devices contain exploits scanning years of your email, phone numbers, and contact information helping criminals to get to your money or monetisable information. (2)

Or will the villains target the consumer?

Besides infected email and malicious websites, 2012 also was the year of increase of targeted attacks against small businesses (typically < 2,500 employees) the small (< 250 employees) being the most hit due to a lack of consistent security measures and existing vulnerabilities especially on mobile / BYOD devices. Crime also seems to have 'moved downstream' from government and public organisations to manufacturing. As infected email or material from malicious websites spreads thanks to contact lists, ultimately the impact may be put on you!

medium_Image2_ArticleOct.png

(source: Internet Security Threat report (2013), Symantec) (3)

Get your strategy together

Your organisation may suffer from the potential impact of a security risk. Instead of primarily investing in 'barrier enhancement' (expensive: trying to avoid impact by placing a barrier such as a virus scanner, sandboxes or Identity and Access Management tooling) more clever options, like maximising the transferrable amount of your mobile banking app to $250 can save a bundle. The six known risk strategies are:

  1. Ignore the head in the sand, 'see-no-evil-hear-no-evil' tactic
  2. Accept the potential impact of some risks to your organization ;
  3. Reduce the potential impact or probability of a risk occurence, like the banking app mentioned above
  4. Transfer use insurance or subcontracting to transfer potential consequences of risks
  5. Avoid not entering the type of business that may incur potential risk impact deemed too high
  6. Exploit risk is also an opportunity and high risk investments may yield high returns

Plot your mobility risks

Apply the referenced literature to your organisation, the diagram below will lead you to the appropriate course of action.

medium_Image3_ArticleOct.png

More measures, lower security budget

Thinking of barrier enhancement solutions seems to be a default attitude when looking at mobile security. However, this will lead to paid probability reduction only and therefore to higher-than-necessary costs. Here are some take aways to avoid fast growing budgets:

  1. Transfer a portion of your mobile risk portfolio to business partners.
  2. Be Aware. Educated staff will reduce the number of security incidents
  3. Withdrawal of authorisations and access rights will reduce the probability and potential impact of your business partners' rogue actions
  4. Screen business partners with advanced system privileges (probability reduction)
  5. Enhance monitoring of business partners / employees with an impeding or ongoing issue
  6. Protect the device, sandbox or virtualize apps, encrypt data or the device and add MDM software with passwords
  7. Monitor logs and/or subscribe to monitoring and defense party (probability and impact reduction)

Summary

Mobile devices introduce additional risks in your organisation. With an adequate risk-addressing strategy however, quite a few measures can be found that are either free or relatively cheap to implement: more security measures may actually lead to lower security budgets.


(1): http://www.avecto.com/news-events/press-releases/80-of-it-security-profe...
(2): http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_...
(3): http://www.symantec.com/content/en/us/about/presskits/b-symantec-smartph...
http://www.sei.cmu.edu/reports/12tr012.pdf
(4): http://www.sei.cmu.edu/reports/12tr012.pdf


Thank you, for your interest in Tips to Increase Your Mobile Security.
Niamh Madigan
Contributor: Niamh Madigan