Tablets to be a bitter pill for infosec

Powered by SC Magazine
 

Deloitte says fraudsters will set sights on tablet devices.

Deloitte claims the ‘bad guys' are waiting for widespread business adoption of tablets before they strike.

Tablets may be becoming the latest gadget for business users, but Deloitte claims the adoption is not yet high enough for serious attacks from hackers.

During a presentation at this week's Infosecurity Europe conference, Matt Adams, manager of the security, privacy and resilience team at the firm, claimed cyber criminals were biding their time before targeting the likes of Apple's iPad until they were full to the brim with valuable data.

Complete coverage of Infosecurity Europe 2012 

“[Tablets] are attracting the interest of the bad guys out there and, as stakes increase, they will be fully aware of the tech out there and how to exploit it,” he said.

“What they are waiting to see is widespread business adoption before they start heavily targeting these products.”

This doesn't mean businesses should sit back on their laurels and not address any security holes in their devices though, with Adams claiming large scale attacks could happen as soon as 2013.

“If you think of the huge adoption we have seen this year, just think how many tablets will be in enterprises by 2013 or 2014,” he added.

The major issue with tablets is they are designed with consumers in mind, rather than large enterprise users.

“A lot of the challenges we see are vendors looking to retrofit enterprise security environments to match consumer products workers want to use,” Adams said.

He also claimed companies who started early at developing their own applications to use on mobile devices may not have done so with security in mind.

“Early movers in developing in house apps don't really have the expertise in house to develop secure applications,” he said.

“They can code… but they are not specialists in developing securely on those platforms.”

However, he said the trend of bring your own device would not abate and it was up to businesses to address the security concerns before cyber criminals started to attack.

“Mobile device management controls are improving,” he said. “Maybe first generation wasn't that good at plugging into iOS for example… but vendors are really moving on with what is possible, working with Apple and other [manufacturers] to deliver enterprise level security controls for devices that weren't designed primarily for enterprise use.”

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Tablets to be a bitter pill for infosec
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 439

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 210

Vote