FEATURE: MOBILE MALWARE
Managing of mobile devices: it is worth
employing appropriately qualified IT
security specialists on the team who can
provide centralised management of all
mobile devices. These skilled employees
can ensure all mobile applications are
installed, removed and updated via
corporate portals.
Dealing with lost or stolen devices:
businesses must develop robust
scenarios for how to remove personal
devices from the corporate network if
they are lost or stolen, or if an employee
leaves the company. A procedure should
be developed to remove confidential
data from these devices and block
access to the corporate network.
Education of employees: staff should
be aware of the realities of cybercriminal
activity and the need for device security.
This can be achieved through an IT
security education programme.
Morton suggests that technologies
such as comprehensive mobile device
management (MDM), application risk
management and threat management
solutions can assist in detecting and
remediating mobile malware. “The
mobility management solution should
provide the basics like password
Anvee Alderton, Channel Manager for
southern Africa, TrendMicro
protection; remote wipe clean and
lock functionality; device encryption;
anti-malware and jailbreak detection.
Over and above that, the solution
should support VPN configuration
and management; offer data loss
prevention; access control to company
networks and printers, and tools for
monitoring, managing and reporting
on the mobile device environment.
Most people believe that if you have
software like MDM or an antivirus that
you are 100% protected. However,
while these applications greatly assist in
protecting devices, the end user has the
final say,” concludes Morton. n
Michael Morton, Mobile Security
Specialist, Securicom
“Enterprise data
for gone mobile
and yet, we don’t
see CIOs and CISOs
protecting mobile
devices the way
they do other
computers in the
enterprise.”
Timeline infographic courtesy of Sophos
36
INTELLIGENTCIO
www.intelligentcio.com