Managing mobile device risks Ian Kilpatrick looks at the risks involved with mobile devices and how to secure them. Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications’ dream and a business risk nightmare. For those in the security industry, the focus is mainly on deploying ‘solutions’ to provide protection. However, we are now at one of those key points of change which happen perhaps once in a generation, and that demand a new way of looking at things. The convergence of communications, mobile devices and applications, high speed wireless, and cloud access at a personal level, are driving functionality demands on businesses at too fast a rate for many organizations. While for some, lockdown is an appropriate solution to this burgeoning situation; for others, the legitimate business benefits mean they must learn to live with it and try their best to make it work securely. These demands, coupled with user skills and experience of deploying mobile devices at home, mean that even organizations on lockdown can have challenging times dealing with staff ‘guerrilla’ deployments. Clearly, part of the solution is deploying the right tools to both minimise and report on the risks (e.g. mobile device management, tracking and RF management, authentication, encryption, and behaviour management - as well as basic security measures on mobile devices). However, a much larger and more important component is actually changing the way that we interact with the problem. Currently, many organizations see dealing with these unprecedented risks as a challenge for the IT security team, whose role is to protect the organization. Traditionally, that was a good working model. However, in the new environment, with immense pressure for fast change and fast deployment of new applications, it is not possible for most IT security teams to carry the responsibility of securing the whole business and every user singlehandedly. Security needs to be the responsibility of every individual user, every manager and every member of the board. However, this is more typically honoured in the breach than in the observance, as evidenced by the fact that only a small number of staff are actually formally sanctioned or sacked for failure to comply. An effective mobile security strategy should include the following: Risk analysis and risk acceptance Planning Embedding security Policies Processes Education and staff involvement Deployment Monitoring and feedback loop Analysis Forensics Implementing the strategy obviously, then, involves the deployment of the correct tools and reporting. Clearly this also raises issue of the integration (or replacement) of existing tools with broader management and reporting solutions - but that is a topic for another day! The author •Date: 20th August 2014 • UK/World •Type: Article • Topic: ISM
|
To submit news stories to Continuity Central, e-mail the editor. Want an RSS newsfeed for your website? Click here |
||||||||