Pda &Amp; Smart Phone Business Security Impact

PDA & Smart Phone Business Security Impact

by

Marc Froemelt

Last year a new breed of worms exploited Bluetooth and MMS to reach mobile wireless devices, commonly carried by business executives, racking up toll charges, destroying stored data and resetting infected devices. These well-connected, poorly-defended devices are fast becoming a lucrative attack target, putting business data and networks at risk.

[youtube]http://www.youtube.com/watch?v=LjKF7aQthcQ[/youtube]

We will investigate business options for securing mobile wireless endpoints like smart phones and PDAs. Specifically, well examine the security measures that can be employed to lock down PDAs and smart phones that are used for business. Market researchers have been predicting explosive growth in mobile device adoption for years. And last year that growth did finally happen; in fact, global shipments of mobile devices, including PDAs and smart phones jumped 75% between the 3rd quarter of 2004 and the 3rd quarter of 2005. Most analysts expect mobile device sales to grow even faster in 2006, a forecast which is prompted in part by expansion of high-speed networks services, such as EV-DO. Although many mobile devices are now being purchased by individuals, business use of PDAs and smart phones is still expanding. According to a 2005 survey conducted by Nokia, nearly 1 in 4 executives now use PDAs for business. In fact, the workforce that is most likely to carry these mobile devices are those that require ready access to business data, like corporate email, meeting schedules, contacts, or even instant messages. This growth results in more and more corporate data being placed at risk by these mostly unmanaged and unsecured mobile devices. Mobile viruses and malware are increasing in frequency and impact, spurred by business adoption and use of targeted mobile devices. This exposes corporate data networks whenever these mobile devices connect, wirelessly or through cradled synchronization, to access corporate data. Redefining the Network Perimeter PDAs and smart phones are increasingly tethered to company resources through a myriad of connectivity options: Serial/USB port desktop synchronization Personal area networks (IrDA, Bluetooth) Wireless wide area phone networks (CDMA, GPRS, 1xRTT, EV-DO) Wireless local area networks (802.11, WiFi) Wireless metropolitan area networks (802.16, WiMax) In the past, most PDAs and smart phones were used primarily used to connect to the public internet, to browse the web, or to access a personal mailbox. However, as mobile workforces have grown and companies have opened private networks to permit internet-based remote access for travelers and teleworkers, this access has become pretty common through VPN (Virtual Private Network) gateways, web portals and internet-based servers like Microsoft OWA (Outlook Web Access). Furthermore, the advent of WiFi and Bluetooth, now common on most mobile devices, means that these PDAs and smart phones can now be connected to access points, wireless printers and other nodes that are inside a company network. Finally, with all the buzz about wireless, it can be easy to forget that those USB connections used to synchronize PDAs and smart phones with desktops PCs actually connect to the corporate network perimeter. Mobility Benefits and Risks Regardless how that connection is accomplished, once a mobile device is connected to an enterprise resource, it does become an integral part of your company network. These mobile devices can boost business productivity by providing anytime/anywhere access to corporate data and enterprise applications. Employees find it easier to get work done, even from locations that otherwise might impose unproductive down-time. However those benefits are accompanied by new challenges. Every mobile endpoint that is used for business requires some degree of IT management. For example, company-owned devices must be inventoried, provisioned and tracked. Every mobile device that accesses your company network and contains business data, including PDAs and smart phones owned by employees, must be secured to prevent loss or compromise of data. Ignoring Risk is not an option To many companies make the mistake of ignoring PDAs and smart phones. They may realize that employees buy mobile devices on their own, but may take the view that those devices are not business computers, hence not requiring IT supervision. The problem with burying your head in the sand is that PDAs and smart phones are used for business, creating hidden risks that may go unnoticed until a security compromise occurs. For instance how many of us accidentally leave a phone or PDA in a public location, like a taxi, plane or restaurant?1 How many of us forward company email to a personal mailbox that we then check over an unsecured public wireless hotspot? These situations are actually quite common and can expose confidential company data. Conclusion Of course there a many security measures that can be used to secure mobile devices, but without company guidance many workers are either unaware of these risks or unwilling to spend their own time and money to secure their devices. Hence companies are better off acknowledging business use of mobile devices, educating work forces about mobile threats, and deploying measures to mitigate the associated business risk. 1 Pepperdine survey of US professionals: 24% lose at least one PDA http://www.pdatoday.com/more/A1460_0_1_0_M/

Marc Froemelt is a Consultant with Schooley Mitchell in Atlanta.

www.schooleymitchell.com/mfroemelt 678.528.6689 mfroemelt@schooleymitchell.com

Article Source:

PDA & Smart Phone Business Security Impact

This entry was posted on Saturday, September 17th, 2022 at 4:09 pm and is filed under Hotel. You can follow any responses to this entry through the RSS 2.0 feed. Responses are currently closed, but you can trackback from your own site.

Comments are closed.