Mobile devices must be secured as standard

Powered by SC Magazine
 

Security experts call for handset manufacturers to include security as standard

Mobile device manufacturers must begin to 'bake' security into devices as standard, and begin to develop common, secure protocols, according to a panel of security experts.

"Handhelds are not secured by design and even industrialised tablets simply aren't out-of-the-box secure. This leads to the requirement to layer on additional security, such as encryption, but this takes up considerable time to deploy. We see huge attrition rates of mobile devices, and the time taken to reinstall the security layers on each new device begins to add up quickly. We urgently need common, secure protocols to solve the problem," said Stuart Cummings, CISO, SABMiller at the Infosec conference.

Cummings continued to make the point that although solutions to many business-related issues with mobile devices are available, their sheer diversity makes it increasingly difficult for businesses to deploy them. "Although security vendors sell products that meet business needs, the fragmentation in the market leads to the need for a variety of solutions to be deployed which aren't necessarily complimentary. This situation simply isn't sustainable", he said.

Jericho forum co-founder Paul Simmonds pointed to the rise in the use of consumer products in corporates as being another driver: "The trouble is that no device is secure by default. Even those that do have security settings need these to be enabled, which rarely happens. Manufacturers need to get the message that mobile devices need to be secured by design."

The challenge of securing the mobile workforce has seen much attention from vendors and IT professionals alike, but the increasing popularity of consumer devices - such as the iPhone - in the workplace is causing a blurring of boundaries between 'business' and 'personal' technology.

Copyright © SC Magazine, US edition


 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 433

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 209

Vote