Software SolutionsBy Ericka Chickowski | Posted 2009-02-26 Email Print
Know the Risk: Digital Transformation's Impact on Your Business-Critical Applications REGISTER >
Security risks rise with the sophistication of mobile devices.
8. Use Intrusion Prevention Software
As smartphones become more and more powerful, they’re likely to become another weapon in the hacker toolbox. As a result, it makes sense to have your intrusion prevention software examining traffic coming through mobile devices.
“It’s possible that you could see attacks come in from phones; they're very sophisticated devices,” Cross says. “I mean, you can run Metasploit on an iPhone. So that’s something you need to think about.”
9. Keep an Open Mind About AV
Cross says that he doesn’t necessarily suggest enterprises go out today and buy host-based antivirus software for their smartphones, but he does believe they should be paying attention to advances in mobile device AV. He believes that it may be necessary in the coming years.
“I don't know what the numbers are , but we've obviously seen a tremendous explosion in the sophistication of these devices and the number of these devices that are out there and i think that that's going to continue,” he says. “It’s my sort of futurist vision that in at some time maybe five or ten years from now there were actually be more smartphones on the Internet as client devices than there are PCs.”
10. Shore Up Bluetooth
Bluetooth capabilities on today’s smartphones may make it easy to talk on a hands-free headset, but they’re also a target for hackers, who can take advantage of its default always-on, always-discoverable settings to launch attacks. In order to limit your exposure, US CERT recommends that users disable Bluetooth when it is not actively transmitting information. It also suggests switching Bluetooth devices to hidden mode. Organizations can limit exposure by making this company policy.