Mobility,Security,Challenges,W communication Mobility Security Challenges to Watch Out For
But when we talk about the handsets, undoubtedly, Nokia is the King of mobile phone market and LG stood at the third position. In this article we are concentrating on Nokia E5 from the house of Nokia and LG GM360 Viewty Snap by LG Mobile Com The Nokia Mobile Company is the undisputed leader in mobile world, they have latest technology and capability to deliver world class handsets at no extra costs. The N series, E series and C series phones have already rocked the world with th
Theadvances in mobile technology in the past few years have been happening at abreakneck speed. 2012 saw the fastest growth ever in the same. With theseadvancements, two other trends emerge firstly, the adoption of smart devicesis at an all time high; secondly, the security risks associated with mobilityare growing. With cloud becoming the choice of data storage, handheld devicesare leveraged to provide easy access to the same. This is a high potentialrisk, because since the access is easy, it can be misused. There is anotherside to the same story. Because more and more devices are connected to thecloud, the potential for spreading malware, viruses, or hackware is also high.Add to the mix the uninformed users and BYOD, and you find the challenge ofprotecting corporate data to be increasingly complex. Thereare three main concerns when it comes to mobile security. 1. Data protection - With BYOD,the ability to manage and trackcorporate data has become more difficult. While devices can be easily replaced,the data residing on them is a bigger concern. Data location and segregationare key challenges when trying to ensure compliance with cloud and mobilityincluded in the equation. Some MDM solutions address the issue. The solution iscontainerization of corporate data within the device. The corporate apps anddata reside in a separate section of the device, and this section can beremotely managed, and wiped if required by the IT admins. Some applicationslike Microsoft Exchange have inbuilt features for controlling the access, whileother apps need some extraneous work to enable containerization. Mobile devicevirtualization is another technique used for compartmentalization of corporate appsand data. Another issue is inadvertent (ormaybe intended) data breaches by employees. What if the user copies a sensitivefile to box.com? What if he / she mails it using a personal account on thedevice? How will the IT know? The usage of such apps needs to be controlled. 2. Malware andhackware mobile commerce, NFC and QR cards all allow the mobile phone to be used forfinancial transactions. While some apps store the payment information, someallow the device itself to be used as a credit card. This makes the mobiles alucrative target for hackers who wish to make financial profit. The unawareusers may install an app that can expose their device to the malicious intentdeveloper. While fishing for financial information, what if the hacker gainsaccess to your corporate data too? Or worse, what if the attack was intendedfor enterprise data in the first place? Anti-malwaresoftware needs to be pushed to the mobile device via the MDM solution in orderto scan any such application that is loaded on the device. 3. Bluetooth Agreat technology for connecting two dissimilar devices, Bluetooth isextensively misused by people with wrong intentions. So much so, that there areterms coined for the misuse of Bluetooth - Bluejacking, Bluesnarfing and Bluebugging. The first term refers to hijacking,or taking control of a device through a Bluetooth connection. Since most peopleleave their BT status as on and discoverable, hackers find it easy to dotheir work. Even when hidden, devices can be hijacked through a brute forceattack. Once under outside control, data canbe copied off the device (Bluesnarfing). Another high risk situation is thatthe controller can use the microphone and camera of the phone to listen to andsee the surrounding people (Bluebugging). Better BT security and employee awarenessare important to avoid untoward events. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable{mso-style-name:"Table Normal";mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-priority:99;mso-style-qformat:yes;mso-style-parent:"";mso-padding-alt:0in 5.4pt 0in 5.4pt;mso-para-margin:0in;mso-para-margin-bottom:.0001pt;mso-pagination:widow-orphan;font-size:11.0pt;font-family:"Cambria","serif";mso-ascii-font-family:Cambria;mso-ascii-theme-font:minor-latin;mso-hansi-font-family:Cambria;mso-hansi-theme-font:minor-latin;}
Mobility,Security,Challenges,W