Two Important Mobile Thread Defense (MTD) Strategies

There are a couple of good strategies to intercept and control mobile vulnerabilities.

GoogleGartner has recently published a report ` When and How to Go Beyond EMM to Ensure Secure Enterprise’. This report underlines the fact that EMM helps to manage a mobile device fleet and enable security to a certain extent.

However, EMM may not help to actively detect, analyze and respond to mobile attacks such as malicious apps, network attacks, vulnerabilities in apps and so forth. MTD or Mobile Threat.

Defense is equally if not more important to safeguard an organization’s information security as it helps to protect sensitive data. Emphasizing its importance, in its report Gartner says, “The synergy between EMM and MTD tools allow for risk mitigation based on real-time information and intelligence sharing.”

Hotspots

Wi-Fi hotspots, a physical location providing Internet access is being adopted extensively. BYOD and advanced network infrastructure have also helped to propel the use of hotspots, compounded by the use of portable devices.

There are both drivers and constraints influencing the hotspot space. One of the biggest concerns with hotspots is interception of cellular data transmission. For enterprises, especially those which encourage workers to bring their own devices to work, free Wi-Fi hot spots can be a serious security concern.

For example, if a worker logs into the enterprise system from a hotspot, there is the possibility that a hacker can gain access to the entire corporate database. By combining two-factor authentication and VPNs it is possible to secure business information.

VPNs generally make it difficult for hackers to read passwords. Adding another line of defense ensures that even if the password is compromised, there is another level of defense in place. Employees who have data plans can also consider tethering their phone or device.

Finally, by encrypting data it is possible to defend data successfully.

Antimalware software

MTD brings us to the next pertinent point, i.e. anti-virus for mobile devices. Anti-virus is basically pointless as it works in an app-centric manner, i.e. anti-virus will not scan all the apps installed in a device.

It will work only for a particular application. However, that does not mean that it is useless or unnecessary.

The best method to ward off viruses is to keep the phones software up-to-date. Android (Know how to update Android Apps outside of google play) and iOS are regularly updated for security purposes and users need to update their software whenever they are prompted to do so.

This will help to some extent to ward off viruses.

Malware, on the other hand, can virtually take any action when running with high privileges.

In the case of mobility, we need to worry about information or identity theft. This kind of behavior can be embedded in inconspicuous looking apps such as games, installed from third-party app stores.

Since a smartphone is a personal device and moves around with the user, it becomes an ideal target to snoop private data, such as contacts, SMS messages and so on.

As the first step, every mobile device needs to be installed with the antimalware software. In the recent past, Android, for example, has been targeted for malware.

The organization must have a policy whereby anyone using their device for accessing official sites and information, must have the antimalware software installed on the device.

Not installing antimalware would mean that malware after an invasion has to be detected. This is extremely difficult.

If before installation, the user notices unresponsive graphical interface or a faster battery exhaustion, the user has room to be suspicious that a malware has invaded his smartphone.

Advertisements

Published by

customsoftwaredevblog

Joseph Aldrich is a Freelance Digital Consultant working in the Information Technology sector. Joseph shares his expertise and knowledge through articles and blogs on trending subjects in the field of technology innovation, software,and IT outsourcing.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s