5G Technology World

  • 5G Technology and Engineering
  • FAQs
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • Wireless Design
  • Learn
    • 5G Videos
    • Ebooks
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Handbooks
    • 2024
    • 2023
    • 2022
    • 2021
  • Resources
    • Design Guide Library
    • EE World Digital Issues
    • Engineering Diversity & Inclusion
    • Engineering Training Days
    • LEAP Awards
  • Advertise
  • Subscribe

The Consumerization of IT: Preventing a Security Nightmare

By Staff Author | February 15, 2012

We are living in an always-on, always-connected society, where mobile phones have gone from merely a portable telephone to an all-powerful, communications device. Consumers are taking to smartphones and tablets because they appreciate the intuitive and user-friendly way these advanced products deliver access to the Web and communications services. For most of us, it would be hard to imagine life without the instant access to find information, communicate, access entertainment and social networking sites, pay bills and more.

Steve DurbinUnfortunately, many of today’s most popular mobile phones and tablets weren’t designed from the start as business tools and therefore do not offer the level of security comparable to present-day desktop and laptop computers. What is more, the way these devices are used blurs the line between personal and business usage and behavior and this will only continue as cheaper, more powerful devices become available. The potential risks include misuse of the device itself, outside exploitation of software vulnerabilities and the deployment of poorly tested, unreliable business apps. In terms of business usage, the question of who owns the device can also have legal ramifications on mobile device management and the remote wiping of devices should the need arise.

Concerns about security breaches, IP theft and data loss demonstrate that a strategy for addressing mobile devices in the workplace is essential. By putting the right business practices and usage policies in place now, businesses will benefit greatly from the flexibility, increased productivity and reduced costs that mobile devices can bring to today’s workplace, while minimizing exposure to potential security risks. Time is critical and businesses need to formulate a response to the growing trend of mobile devices in the workplace with a sense of urgency.

The Information Security Forum (ISF) has conducted detailed research on the “Consumerization of IT” and as a result, we are able to offer real-world guidance on the challenges and solutions, as well as an overview of the consumerization trend and how businesses can plan a response.

We’ve broken down consumer mobile security on devices in the workplace into four useful components:

1. Governance

With no control over consumer devices, there is little or no visibility of usage and penetration, and poor knowledge of ownership, support requirements, adherence to policies or compliance. In addition, consumer mobile devices and apps are typically sourced from a wide variety of unapproved, non-corporate suppliers, with limited attention paid to service provision contracts.

Businesses need to create a framework for ensuring correct and consistent mobile device security assurance. This involves getting an understanding of the extent of mobile device penetration and identifying the different device user groups, their requirements and the attendant risks. They then need to agree upon a device provision mechanism, define policies around ownership, corporate access and acceptable use and identify any statutory requirements.

2. Users

With no control over consumer device working practices, users are free to combine work and personal tasks and data, with the risk of working in unsuitable locations and exposure to loss and theft. Users can potentially misuse or abuse the device through jail-breaking or disabling security features. They might also copy data to removable storage devices, or use the device for making inappropriate calls, or for downloading and sending offensive or inappropriate content. Backing up business data along with personal data to insecure or inappropriate locations could easily present a security risk.

Businesses need to ensure employees are aware of what constitutes good working practice for mobile devices. As well as making consumer device security an integral part of awareness campaigns, businesses should also create an Acceptable Use Policy which their employees must sign. In addition, businesses should consider monitoring device usage and enforcing policy through disciplinary or financial sanctions.

3. Devices

Left unprotected and unmanaged, consumer devices are exposed to a range of information security threats. These include exploits by malware targeted at the device’s operating system or apps, unauthorized connections, exploitation of software vulnerabilities by malware that exposes data or causes unexpected behavior and compromise or irrecoverable loss of data.

Businesses must put technical solutions in place for securing access to mobile devices and their content. This includes enabling or installing functionality such as malware protection, firewalls and storage encryption, enforcing complex passwords and enabling remote maintenance, upgrades and device wipes through a Mobile Device Management (MDM) system.

4. Applications and Data

Most applications on consumer mobile devices will have been purchased or downloaded from an app store or software vendor. In many cases the provenance of the apps is unknown, and they are unlikely to have undergone formal software development and testing or to be provided with proper documentation and upgrade regime. The apps may also lack activity reporting and logging, and typically provide poor data protection.

Businesses need to make sure that apps used for business, and the types of data they are able to access or generate, are appropriate and properly tested. This might include going as far as developing apps in-house and building an organization app store. This way, apps could be thoroughly tested and secured against malware infection or attack. Businesses could implement data classification to set limits on the type of data that can be accessed or generated by users on consumer devices.

Obviously, no mobile device will ever be 100 percent safe. Businesses cannot afford to stand still and allow mobile device adoption to run its own course as it will create new attack vectors and potential vulnerabilities in corporate networks. Businesses need to stay one step ahead on all of the latest trends, mobile devices and related security risks. By putting in place the right working practices, usage policies and management tools, businesses can benefit from the advantages that these devices can bring to the workplace while minimizing exposure to potential security risks.

Steve Durbin is global vice president at the Information Security Forum.


Filed Under: Devices

 

Next Article

← Previous Article
Next Article →

Related Articles Read More >

High-directivity couplers optimized for 225 – 750 MHz applications
Integrated into IoT devices, iSIM poised to make inroads
Triple-radio and multiprotocol MCUs add application processors
5G vectors
How RedCap fits into 5G and IoT

Featured Contributions

  • Overcome Open RAN test and certification challenges
  • Wireless engineers need AI to build networks
  • Why AI chips need PCIe 7.0 IP interconnects
  • circuit board timing How timing and synchronization improve 5G spectrum efficiency
  • Wi-Fi 7 and 5G for FWA need testing
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE LEARNING CENTER

EE Learning Center
“5g
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Engineering Training Days

engineering
“bills
5G Technology World
  • Enews Signup
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search 5G Technology World