|
|
|
BYOD Security Ascends to the Cloud
Published Nov 19, 2012
|
Mobile security is evolving to ensure smartphones and tablets are secure from malware, but businesses remain at risk from within, as long as employees connect to enterprise networks with their own devices.
There has been a growing understanding of threats and vulnerabilities associated with everyday computing in the Middle East, but the popularity of mobile devices here is presenting new risks, and scams have become more difficult to spot, says John Yun, Blue Coat's Director of Product Marketing.
"There are two areas we look at when it comes to mobile security. One is the actual device itself and the other is how that device is used to infiltrate a network," Yun tells AMEinfo.
"As we see more and more employees bring their own device to work, another concern is that there is a door to the network. Even if a device is not compromised it can still be used as an access point."
A typical phishing scam may involve an email from a fraudster requesting personal details, posing as a representative from your bank. Users are generally wise to this type of fraudulent request, since phishing is nothing new.
However, as desktop browsing allows you to roll over hyperlinks to inspect suspicious URLs, the simplified interface of a portable device leaves mobile users at a greater risk of clicking a dangerous link.
For individuals this leaves sensitive information at risk, but for businesses that risk is magnified, with access to the company network at stake.
"Companies cannot afford to load security applications onto employees' mobile devices. The sheer hassle of such a measure negates the flexible approach of BYOD," says Yun, who was in Dubai ahead of Blue Coats Mobile Device Security (MDS) launch in the region.
"It makes sense to offload the analysis to the cloud, because ease and efficiency is the main reason the device is being used in the first place."
MDS operates at the network level, as opposed to the device level, extending protection and control to mobile devices in any location. This approach allows businesses to embrace smartphones and tablets while remaining secure and aiding flexibility to employees.
The service is initially available for iOS, and as versatile as an iPhone or iPad is, these devices do not quite have the processing power of most laptops. This limits processer intensive applications, but such a service can outsource security scanning to the cloud, maintaining device performance.
Android at risk as scammers use Saudi IPs
A similar version of MDS for Android will be available early 2013, although Google's own OS appears to face a greater threat level, according to a new security report.
Trend Micro's Q3 Security Roundup includes "Aggressive Adware", which can include applications that allow a greater deal of personal collation than the user has authorised.
The number of dangerous applications for Google's mobile OS shot up from around 30,000 in June to almost 175,000 worldwide by the end of September, with Saudi Arabia recording the highest level of hosts at 1,033,891 - almost quadruple the figure from 2007. Such a rise is troubling, since only 20% of Android users have a security application installed.
"It's actually no surprise that we see such a huge increase in mobile malware," says Trend Micro's CTO, Raimund Genes. "Android is the dominant smartphone platform and the digital underground figured out a way to make money with mobile malware. And unlike your computer, getting information from your phone also reveals your location, the phone numbers you have called - and more," he explained.
Saudi Arabia has also come on the scene recently as a source of spamming activities associated with the FESTI botnet. However, despite the kingdom being listed as the top spam-sending country, it does not necessarily mean the spammers are based there.
They may just be taking advantage of the fact that Saudi Arabia-hosted IP addresses will not raise red flags as those of countries normally associated with cybercriminal activities.
Posted by
VMD - [Virtual Marketing Department]
|
|
|