Think your enterprise mobile devices are secure? Think again. The devices your employees use for work purposes are treasure troves of sensitive information, writes DOROS HADJIZENONOS, Country Manager of Check Point South Africa.
Think your enterprise mobile devices are secure? Think again. The iOS and Android devices your employees use for work purposes are treasure troves of sensitive information, and it only takes one compromised device to put your business in a perilous predicament.
A 2016 survey of IT security professionals showed that 40% of organisations make BYOD available to all employees while 32% make it available to select employees. Workers use these same devices to download personal apps and emails – exposing your network to phishing scams and malware infections.
More than one billion Android mobile devices are not safe – and may never be. iPhones and iPads aren’t immune to risk either. In fact, there is a 50% chance that an organisation with more than 2,000 mobile devices has at least six infected devices.
Here are the five most common misconceptions about mobile security and how you can secure your mobile workforce.
1. Mobile isn’t a big problem
Firewalls and security infrastructures that protect PC desktops and laptops do not provide enough protection from mobile attacks.
Mobile attacks come from three primary sources: network attacks, infected apps and system exploits. While testing mobile security for prospective customers, Check Point regularly finds 5% to 20% of enterprise devices are already compromised. It takes only one compromised device to penetrate your security perimeter.
Discovering a breach takes an average of about six months, and a response to fix the breach another three months. This means that once a breach is detected, the damage is already done. Remediation can be costly, as is containing the damage to brand reputation. Even if the damage is under control, your company may not know vital trade secrets were compromised until your competitive advantage is suddenly lost.
2. MDM is enough
Many companies rely on basic mobile hygiene policies using mobile device management (MDM) or enterprise mobility management (EMM) solutions. Some augment these solutions with a hodgepodge of point solutions that offer incremental and often rudimentary enhancements.
These solutions help control damage inflicted by compromised devices and address many known threats, but are unable to detect recently created malware or new vulnerabilities in networks, operating systems and apps.
For example, gaining root access to a mobile device (also called “rooting” on Android or “jailbreaking” on iOS) enables cybercriminals to make a broad range of customisations and configurations to serve their objectives. MDM and EMM systems detect the existence of certain files in a system directory that enable root access by employing several methods, including static root indicators. However, free tools for Android and iOS devices are available for avoiding this type of detection. By changing root access indicators continually, cybercriminals can evade detection, and even deny root check requests from the EMM or MDM system, disabling detection entirely.
3. Secure containers are safe
Secure containers for data management platforms provide security inside the enterprise perimeter. However, mobile devices often access systems and apps like Salesforce, Oracle or SAP outside the perimeter. While these systems and apps have their own protections, network spoofs or man-in-the-middle attacks eavesdrop, intercept and alter traffic. Everything a user does, including entering passwords, could be intercepted by criminals, and used to breach the perimeter and to steal financial and personnel information.
Attackers often trick employees into logging into malicious sites. While users believe they’re interacting with a known and trusted entity in the cloud, the attacker takes over their device, copying credentials, snooping on instant messages, or stealing their sensitive information.
Corporate executives and employees sometimes save critical documents and sensitive information outside the secure container – using a cloud storage service to easily access while travelling or share with partners. Once compromised, attackers intercept these communications and access these important and sometimes confidential documents.
4. iOS is immune
Apple’s iOS is not immune to threats. Some organisations using MDMs unwittingly distribute infected apps to iPhones and iPads. Apps from unauthorised, unreliable app stores may also harbour viruses, and hackers even compromised Apple’s development tools, sneaking malware into new apps without the developers’ knowledge.
Check Point recently discovered a vulnerability found in iOS that exploits a loophole in the Apple Developer Enterprise program. The program lets organisations develop and distribute apps for internal enterprise use without publishing them on Apple’s App Store. These apps typically distribute quickly and directly to devices.
However, malicious apps can use this same method and enable criminals to stage man-in-the-middle attacks and hijack communications between managed iOS devices and MDM solutions. This type of exploit gives criminals control of the devices, the data that resides on them, and even enterprise MDM services.
Flaws in Apple’s enterprise app installation process allow the introduction of unverified code into the iOS ecosystem. MDM systems could end up being the distribution systems for the very malicious apps they are defending against. Without an advanced mobile threat detection and mitigation solution on your iPhone, you may never suspect that any malicious behaviour ever took place.
5. Mobile antivirus is all I need
Mobile antivirus solutions are limited compared to their PC cousins. They can uncover malicious code in apps by looking for unique binary signatures that identify known malware. However, criminals have found new ways to obfuscate those signatures, making them useless in the detection of mobile malware. Even a slight change in the code, such as adding a simple line that does nothing, changes the app’s signature and the new version of the malicious app will slip by undetected by the antivirus program.
Signatures are not available for “zero-day” (newly created) malware. To catch and block a virus, your antivirus program first must know that it exists. Even if updated daily, antivirus programs still couldn’t keep up with the onslaught of these attacks.
Secure your mobile workforce
Mobile devices require a new, intelligent approach to threat prevention. MDM and EMM protection and secure containers are not enough, and antivirus products cannot cope with new malware found every day. Even iPhones are not secure. The continuous, rising wave of attacks puts your company at serious risk.
You need a solution that continuously analyses devices, uncovering known and unknown vulnerabilities and criminal behaviour, by applying threat emulation, advanced static code analysis, app reputation, and machine learning.
Stop malware before it communicates with criminal servers, and detect threats at the device, app, and network levels. Always have an accurate picture of the threats and devices on your network and detailed information about risk mitigation.
Welcome to world of 2099
The world of 2099 will be unrecognisable from the world of today, but it can be predicted, says one visionary. ARTHUR GOLDSTUCK met him in Singapore.
Futuristic structures tower over the landscape. Giant, alien-looking trees light up with dazzling colours amid the hundreds of plant species that grow up their trunks. Cosmetic stores sell their wares via public touch-screens, with products delivered instantly in drawers below the screens.
This is not a vision of the future. It is a sample of Singapore today. But it is also an inkling of the world we may all experience in the future.
Singapore was the venue, last week, of the World Cities Summit, where engineers, politicians, investors and visionaries rubbed shoulders as they talked about the strategies and policies that would enhance urban living in the future.
As part of the Summit, global payment technologies leader Mastercard hosted a small media briefing by one of Singapore’s leading thinkers about the future, Dr Damian Tan, managing director of Vickers Venture Partners. The company’s slogan “We invest in the extraordinary,” offers a small clue to Tan’s perspective.
“We look as far forward as 2099 because, as a venture capital firm, we invest in the long term,” he tells a group of journalists from Africa and the Middle East. “Companies explode in growth because there is value in the future. If there is no growth, they won’t explode.”
The big question that the Smart Cities Summit and Mastercard are trying to help answer is, what will cities look like in the year 2099? Tan can’t give an exact answer, but he offers a framework that helps one approach the question.
“If you want to look at 81 years into the future, and understand the change that will come, you need to double that amount and look into the past. That takes us to 1856. The difference between then and now is the difference you can expect between now and 2099.”
Click here or on the page link below to read on: Page 2: Soldiers and Health in 2099.
- Arthur Goldstuck is founder of World Wide Worx and editor-in-chief of Gadget.co.za. Follow him on Twitter on @art2gee and on YouTube
Street art goes electric
Kaspersky Lab and British street artist D*Face have unveiled the first-ever “art helmet” design at the Formula E finale for electric cars in New York.
The ‘Save The World’ helmets will be raced by DS Virgin Racing’s drivers, Sam Bird and Alex Lynn, as they traverse the New York street circuit during the final races of the Formula E season.
The announcement signals the first art helmet by a Formula E team, continuing the heritage of art in motorsport and the cybersecurity brand’s commitment to contemporary art, creativity and innovation. D*Face took inspiration from Kaspersky Lab’s tagline, “A Company To Save The World”, and hopes that his colourful work will inspire people to take positive action.
D*Face will announce his first-ever art car design with a custom-made livery for the DS Virgin Racing Team. Its design will be released at the “Art Goes Green” event after Saturday’s race. The helmets and art car are the latest installations in the “Save the World” collection, following a major permanent public mural that was installed in Brooklyn, New York, in May.
D*Face, whose real name is Dean Stockton, said: “It is exciting to work with Kaspersky Lab on this project and create art with a real message of hope for a better future. After all, this is our world and we need to look after it. It will take every one of us to make a real lasting, impactful change. I love the mentality of the DS Virgin Racing Team and that of Formula E by showcasing sport in a way that doesn’t harm the environment, but is still just as exhilarating and fun.
“It is time for us all to stand together and make a change… be that stopping data steals, climate change, plastic waste or using damaging fuels. I want everyone to make a pledge to do one thing that will help make a change.”
As a sponsor of DS Virgin Racing Team, Kaspersky Lab is responsible for protecting the team’s devices against cyber threats. The company sees the technical environment in the global sport of Formula E as the next frontier in furthering its research and development of new technologies to keep vehicles secure in the digital world.
Sylvain Filippi, Managing Director at DS Virgin Racing, said: “The whole team fully supports this great initiative and our thanks got to Kaspersky and D*Face for their collaboration. It’s an honour to have such an innovative artist bring his talents to bear in our team ahead of the season-finale; the car, drivers’ crash helmets and mural all look amazing.”
Aldo Fucelli Pessot del Bo, Head of Global Partnerships and Sponsorships at Kaspersky Lab added: “There is a need for innovation on a global scale, both in contemporary art and in the fast-growing sport of Formula E. Now, for the first time ever, Kaspersky Lab is proudly bringing together the two sectors in an effort to Save the World and unleash creativity, encourage freedom of expression and further innovation.”