Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Decoding Mobile Device Security

May 1, 2005
Mobile devices that blend computer and communications technologies deserve security’s attention. Tightly integrate protection into the use of these devices
It is no secret that mobile computing devices such as notebook PCs, PDAs and smart phones are becoming part of the enterprise information infrastructure. A recent survey of 500 large organizations confirmed: “These devices are becoming a critical component of an organization’s portfolio of work tools.” More than 80 percent of the companies surveyed stated that handheld devices are important to improve the productivity of the mobile workforce, an important trend behind IDCs estimate that 86 million handheld devices will be in use by 2007.

In view of the proliferation of mobile computing devices, it is surprising how few are appropriately secured against the financial, legal and regulatory risks associated with the potential exposure of sensitive data. Probably fewer than 10 percent of the mobile devices used by major organizations have any serious protection for stored data. This vulnerability persists despite annual CSI/FBI studies that document substantial financial losses associated with theft and exposure of confidential data, as well as stringent federal regulations governing the security of private data collected by a broad range of financial and healthcare organizations. States are also enacting tough new laws, such as California SB1386, that requires companies to notify residents of any actual or potential incident that threatens the “security, confidentiality or integrity” of private data. It is little wonder that security tops the list of concerns IT managers expressed about mobile devices; 91 percent worried about protecting data on mobile devices and 72 percent were worried about the theft of mobile devices.

Reassess risk

Since mobile computing is a permanent feature of an enterprise, every organization needs to reassess its risk. One benchmark concept for securing mobile devices is to create “virtual physical security,” which means security equivalent to that of a PC in a locked office. Further, as many devices are now being directly connected to the Internet, end users must also consider the measures necessary to prevent unauthorized electronic access by remote hackers. It is also imperative to understand the enterprise infrastructure necessary to deploy and maintain physical and electronic access controls on large numbers of devices.

To begin, it is useful to think of mobile devices as self-contained networks, needing essentially the same types of security measures as enterprise networks, specifically access control, user authentication, data encryption, a firewall, intrusion prevention and protection from malicious code.

Access Control: The fundamental security problem inherent in mobile devices is the lack of physical access control. Mobile devices are designed for use outside the physical confines of the office or factory. Consequently, PDAs and smart phones are often used precisely where they are most vulnerable – public places, lobbies, taxis, airplanes – where risks include loss, probing or downloading of data by unauthorized persons and, frequently, theft of the device itself. The damage can be personal as well as corporate; many users store information such as credit card, bank account and Social Security numbers, for themselves as well as that of family members, on notebook PCs and PDAs. Consequently, all mobile devices must have a protective mechanism that restricts access to authorized persons only. This in turn requires the ability to authenticate the identity of users.

User Authentication: A system doesn’t have to be able to identify everybody, only those persons (presumably no more than a few) who have access privileges to the data stored on the device. In this context, PINs are generally an acceptable means of authentication because they reside on the device only and are never transmitted. In addition, security systems for notebook PCs often utilize USB tokens or smart cards to prove user identity. Nevertheless, even with proper access control and user authentication in place, sensitive data is at risk because an attacker might chose to simply remove the hard drive or memory card for use in an unprotected device. Consequently a third element, data encryption, is an indispensable element of security.

Data Encryption: With fast processors and large memory, portable computers carry current and critical data that may lead to serious financial loss if compromised. Fortunately, the last line of defense, data encryption, is very hard to defeat by any but the most experienced thief. The objective is to make decryption economically unrewarding instead of theoretically impossible, so even moderately strong systems accomplish much. The most important consideration is to make sure that the encryption process is automatic, transparent to the user, and protects all stored data; systems that require user involvement to encrypt specific files in specific places cannot provide the provable security regime needed by organizations. Of course, encryption is effective only if authorized people control the decryption key, so there is necessarily a tight connection between encryption and user authentication. Together, access control coupled with user authentication and encryption, are the three elements that comprise virtual physical security.

Firewall, intrusion prevention

Mobile devices are increasingly Internet-connected as salespeople log on from hotel rooms and officers carry PDAs with wireless networking. Of course, Internet activity exposes mobile devices to all the risks faced by an enterprise network, including penetration and theft of important secrets. But the problem doesn’t end there – these same devices generally also contain logon scripts, passwords and user credentials that can be used to compromise the company network itself. In short, a personal firewall is an essential security requirement. As blended security threats proliferate, the addition of an intrusion prevention feature to the firewall will become increasingly attractive.

The proliferation of mobile devices has spawned a new generation of viruses specifically designed to infest PDAs and smart phones. Until now, these have been more of a nuisance than a major threat, mainly causing concerns about propagating viruses or Trojan horses when synching between PDAs and desktop machines. But the increasing dependence on portable devices coupled with frequent connections to the company network makes this a concern that must be addressed with appropriate anti-virus protection.

Between virtual physical security requirements intrusion prevention/ant-virus software, security mobile devices requires a lot of technology for a single device. Thus, security administration becomes a huge issue when thousands of mobile devices are deployed. Policy enforcement, deployment, updates, helpdesk, key recovery and system logging are all vital components of an enterprise system that provides provable security to comply with data privacy regulations and repel litigation.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Generic Image for Cyber Security

    Mobile Device Security Lacking in Hospital Policy Discussions

    See More
  • mobilesecurity

    5 Keys to Mobile Device Security Today

    See More
  • mobile_enews

    Security and the Bottom Line: The ROI of Mobile Device Management

    See More

Related Products

See More Products
  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!