The last few months have drastically increased our reliance on mobile capabilities. Through the increased use of corporate mobile apps, virtual private networks (VPNs), hot spots and more, mobile communications are more critical than ever. Because of this enhanced, unprecedented and sudden dependence on mobile capabilities, mobile security should be at the forefront of everybody’s minds — not just the minds of security professionals.
“Mobile devices have rapidly replaced the personal computer at home and in the workplace,” notes Europol. “Our phones or tablets are in fact mini-computers, and should be protected as such. They face the same or even more threats than a PC or a laptop.”
Despite this obvious fact, we still make mistakes. According to the Verizon Mobile Security Index 2020 report, 43 percent of companies surveyed admit they sacrificed security for expediency, convenience or profitability targets, or due to a lack of budget or expertise.
Organisations need to better understand and communicate what needs to be done to accomplish business and security goals, from the top down. But as endpoints proliferate in your organisation’s network, so do opportunities for a security breach.
Phishing and social engineering attacks
Poor cyber hygiene, including weak passwords and improper or no use of multifactor authentication (MFA)
Poor technical controls, such as improper session handling, out-of-date devices and operating systems, and cryptographic controlsFor the most part, all of these issues are fixable, even as threats evolve. So, why are our networks still getting hammered? Well, go back to the Verizon report: “Speed outweighs security.” The need to meet business targets, whether related to time, money or avoiding cumbersome security tasks, is usually the reason why speed takes priority over security. This should give you a sense of why security operations centres (SOCs) are overwhelmed with alerts.
Answer this simple question: Are mobile apps, generally speaking, designed for the purpose of convenience and productivity or security and risk minimisation? If we’re being honest, we know the answer is convenience and productivity.
Now apply the same question to all-around mobile usage. We don’t carry laptops, tablets and phones around because they are less vulnerable and reduce risk; in fact, they are inherently vulnerable and their use increases risk. We use them because they make our lives easier and increase our productivity.
Therefore, how we prevent mobile security threats from harming us and our data, has little to do with what technical solutions we come up with. Instead, it is a question of supply and demand and where we assign value.
To reduce the risk of our mobile apps and improve our mobile security posture, the first step is identifying the demand for various commodity mobile capabilities. What types of commodities are we talking about? Well, anything deemed valuable.
Network performance, including load, downtime and upgrade
Cross-functional collaboration between business units
Data accessibility, including data classification
Cost and maintenance
Understand that when dealing with risk, perfect is often the enemy of good enough, especially in cases where risk is not clearly defined, such as in cybersecurity.
Therefore, only after having dealt with the big issues should you start to deploy your tactics, which include, but are not limited to:
Whitelisting vs. blacklisting of applications
Bring-your-own-device (BYOD) usage vs. total segregation of all work and personal usage
Network restrictions and associated costs. e.g. an organisation realises it is more expensive to issue hot spots to all its employees, but it is willing to accept that cost to ensure employees only use approved network devices, preventing the use of public or even home Wi-Fi
Endpoint detection and monitoring capabilities privacy and network performance challenges
Mandatory VPN usage as a matter of not only written policy, but also technical policy
Mobile device management (MDM) platform configuration, including limiting or even terminating the use of some or all mobile apps and capabilities in general.
Given our usage, “mobile security” is just security nowadays. The strategic challenges an organisation faces are the same, regardless of which endpoint is accessing the data. Therein lies the key: In order to have a secure mobile operation, you’re going to have to look at a whole series of issues that are not necessarily technical. Can the 5G supply chain be trusted? What role does the internet of things (IoT) play in the ecosystem? What potential privacy liabilities are there? Is an always-on, always-connected employee really more productive than one who can have a clean break a few hours a day?
Tackling the mobile security issue is complex. You need to start with simple solutions, like getting the basics right, understanding the demands of your business and deciding what risks you want to take on. Address those issues and everything else becomes easier.