Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Mobile
    • Networking

    Mobile Security Is a No-Win Game When Cyber-Criminals Have the Upper Hand

    Written by

    Wayne Rash
    Published July 30, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      By now, you are likely wondering why I€™m talking about game theory when discussing mobile security. The reason came when I chaired a panel at the NetEvents Americas Press Summit on the topic, and realized that the very best a network security manager can do is keep the bad guys at bay. What€™s worse is that it€™s a battle that you certainly can€™t win, and that the best you can do, if you€™re really lucky, is break even.

      To say that the odds are stacked against you is an understatement. One of the panelists, former FBI Special Agent Jill Knesek, who is now head of Global Security with BT Global Services, said that her company performed an analysis of Android apps from Google Play and found evidence of active or dormant malware in about a third of all Android apps.

      Adding to the difficulty of maintaining security in the enterprise is the ease of breaking security rules without realizing it. A good example is cloud storage such as Google Drive or Microsoft Skydrive. While the services themselves encrypt the data that€™s stored there, it€™s accessible to anyone who knows or can figure out the password. This sort of problem is made worse with BYOD, both because users aren€™t thinking about security since they own the devices and second because there are significant impediments to maintaining security, including laws in some places that can keep you from wiping your company data from a personally owned device.

      BT€™s Knesek said that the only thing that is likely to make companies realize the risk of not controlling the personally owned devices in their companies is a tragedy. €œOnly when bad things start happening will this change, such as if a young woman whose phone gives away her location is raped and killed as a result,” she said. “It’s a trade-off.€

      Effectively, security managers in the BYOD and mobile world are faced with several challenges. One is to try to maintain the level of control they can. Another is to realize that they can€™t control everything, and to determine, as Knesek suggests, the level of risk they€™re willing to accept.

      Finally, it€™s important to balance the benefits of mobile technology against the risks. If your company shows significant gains in productivity by mobilizing the workforce, then some risk may be worth it. Likewise, if you can incorporate reasonable protections, such as next-generation firewalls, to limit what employees can do while using the corporate network, this move may help prevent them from dumping corporate data into insecure places. But it might not.

      Dumb Users, Regulators Are Part of the Problem

      In addition to the legions of bad guys who are trying to steal your corporate data, mobile security managers are saddled with an even bigger problem: dumb users. Despite everything you may try to accomplish by managing data loss exposure, by limiting the apps users can use while connected to the corporate network and by controlling what they download and upload, you€™re still at the mercy of the employee who loads corporate data on to their mobile device and then takes it home. While you can limit this to some extent through training and through security awareness, there are some things that you can do nothing about.

      In some places, regulators limit what security managers can do or what devices can be sold in their countries. Jose Otero, president of the Uruguay-based Signals Telecom Consulting said that stupid users are only part of the problem. €œWe have stupid regulators, as well, who don’t understand security, malware, or BYOD [bring your own device].€

      Adding to the problem are mobile device manufacturers, such as Apple, that prevent full management of their devices. Apple iPhones and iPads always allow the user to have control over their devices, and iOS doesn€™t provide the full management capability that some other mobile devices allow.

      So what can you do? Knesek said that, at BT, the executives solve the problem of security by carrying two devices€”one that€™s owned and controlled by the company, and the other that€™s personal. This means that all company data is on the company-owned device, and the personal device is used only for personal data. She pointed out that this has one distinct advantage: The executive can turn off the company device and not be bothered by work.

      Another answer, obviously, is to use a device that€™s secure in the first place. It€™s probably significant that when I polled my panel while we discussed our presentations over coffee and bagels at the Loews Hotel in the South Beach area of Miami, I found that four of the five panelists used BlackBerry devices. One used an iPhone. None of the security experts depended on an Android device for communications. The iPhone user (we won€™t say who it was) expressed embarrassment.

      But in reality, choosing the right platform is only part of the problem. The bigger problem is using the device appropriately, and that€™s where the zero-sum game comes in.

      Editor’s Note: This story was updated to correct the spelling of Jill Knesek€™s name.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×