Tablets to be a bitter pill for infosec

Powered by SC Magazine
 

Deloitte says fraudsters will set sights on tablet devices.

Deloitte claims the ‘bad guys' are waiting for widespread business adoption of tablets before they strike.

Tablets may be becoming the latest gadget for business users, but Deloitte claims the adoption is not yet high enough for serious attacks from hackers.

During a presentation at this week's Infosecurity Europe conference, Matt Adams, manager of the security, privacy and resilience team at the firm, claimed cyber criminals were biding their time before targeting the likes of Apple's iPad until they were full to the brim with valuable data.

Complete coverage of Infosecurity Europe 2012 

“[Tablets] are attracting the interest of the bad guys out there and, as stakes increase, they will be fully aware of the tech out there and how to exploit it,” he said.

“What they are waiting to see is widespread business adoption before they start heavily targeting these products.”

This doesn't mean businesses should sit back on their laurels and not address any security holes in their devices though, with Adams claiming large scale attacks could happen as soon as 2013.

“If you think of the huge adoption we have seen this year, just think how many tablets will be in enterprises by 2013 or 2014,” he added.

The major issue with tablets is they are designed with consumers in mind, rather than large enterprise users.

“A lot of the challenges we see are vendors looking to retrofit enterprise security environments to match consumer products workers want to use,” Adams said.

He also claimed companies who started early at developing their own applications to use on mobile devices may not have done so with security in mind.

“Early movers in developing in house apps don't really have the expertise in house to develop secure applications,” he said.

“They can code… but they are not specialists in developing securely on those platforms.”

However, he said the trend of bring your own device would not abate and it was up to businesses to address the security concerns before cyber criminals started to attack.

“Mobile device management controls are improving,” he said. “Maybe first generation wasn't that good at plugging into iOS for example… but vendors are really moving on with what is possible, working with Apple and other [manufacturers] to deliver enterprise level security controls for devices that weren't designed primarily for enterprise use.”

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Tablets to be a bitter pill for infosec
 
 
 
Top Stories
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
Microsoft confirms Australian Azure launch
Available from next week.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 309

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote