What should you consider when planning your mobile security solution?
Posted by gachou on Wed, 04/10/2017 - 15:03
With the new regulations around mobile handsets coming into effect, and security breaches becoming prevalent, our experts are being asked for more mobile security advice than ever. Here, Peter Chernin shares five of the key things you should be considering when planning your mobile security solution.
1. Handling rogue WiFi networks
Your phone is smart, but only to a certain extent. It will recognise names of wifi networks and automatically pick up any network it has previously connected to. However, if someone puts a beacon down and calls it ‘Starbucks WiFi’ for example, your phone will recognise the name and connect to this rogue network. You MUST ensure your mobile security solution can recognise and block these rogue networks, or risk opening your network up to cyber criminals.
2. Real time data analysis
In some countries, data usage can be very expensive, and it can take a network up to three days to be sent any usage information, delaying ability to stop the connection and costing a lot of money. For example, a user downloading a single movie in Ukraine has been known to cost £12,000! If that companies solution had real time data analysis, this usage would have been known about and stopped instantly.
3. White-listing and blocking websites
This is a simple one, but can be very important. You’ll likely have internet restrictions across your corporate laptops, so remember to replicate this across your mobile suite. Look for the ability to not only block certain websites or content types, but also to be able to white-list those sites which are important for your workforce to be able to access.
4. Recognising interceptors
A ‘man in the middle’ attack occurs when device user A sends information to device user B, but the information is intercepted and accessed by person C – often with malicious intent.
In the simplest attacks, the interceptor just accesses the information being sent with no one knowing. However, in more advanced attacks, the ‘man in the middle’ can impersonate both parties and send and receive data to and from each of them. Avoid this type of attack by securing each person on your network, ensuring all information is sent securely and cannot be intercepted.
5. Making the most of data allowances
2016 was the first year in which over 50% of UK internet traffic came from mobile phones, meaning data usage is now more in demand than ever. Make the most of your mobile data packages by compressing data that comes via your corporate devices. Doing so will give each user 10% more data, offering big savings when applied across multiple users.
Once you have thought about the above, and ensure you have included them all in your mobile device management solution, you’ll find you’re less at threat from the myriad of mobile security threats out there.