Learning Guide

Handheld and mobile device security: Mobile malware, breach prevention

    Requires Free Membership to View

As the rate of handheld and mobile device adoption in the enterprise continues reaches a saturation point, malicious hackers are increasingly advancing their methods and techniques to try and target these mobile devices. The implementation of solid handheld and mobile device security polices and techniques is imperative in the fight against mobile malware and viruses.

This mini learning guide offers tips from the experts on how to bulk up your mobile device security policies and techniques in order to protect sensitive corporate data. Our experts define common mobile device security concerns, and identify must-have security intrusion prevention measures for wireless network security. This guide will also cover how to implement security polices and best practices without straining your wallet.

Defining handheld, mobile device security concerns
(see link below)
Today, the most common method for stealing information from mobile devices is physical theft. Few people password-protect their cell phones and PDAs, although the vast majority of products on the market support authentication with a simple PIN.

In this tip, Ed Skoudis explains mobile device security and unveils how to secure sensitive data on mobile devices, and the most common mobile device security threats, including physical theft and remote exploitation.

Protecting enterprise networks from new mobile application downloads
(see link below)
Thanks to the proliferation of mobile application download sites, enterprise users now have a nearly unlimited number of third-party apps installed on their iPhones, BlackBerrys and other handhelds. And as third-party applications become more popular, they pose a number of security risks for the enterprise, serving as a potential platform for the distribution of malware and unauthorized access to private information.

In this tip, mobile device security expert Sandra Kay Miller explains how administrators can keep their networks safe from mobile device security threats, prevent data theft and stop the spread of malware while still allowing employees to use their devices.

Must-haves for wireless network security: WLAN switches, intrusion detection and more
(see link below)
Devices like WLAN switches, which can manage hundreds of access points, deserve a look, especially when setting up an enterprise wireless network.

Joel Snyder of Opus One reviews the WLAN switch technology and explains why intrusion detection systems and firewalls also need to be carefully added to a "defense-in-depth" network configuration.

Three steps to achieve smartphone, mobile device security within a budget
(see link below)
Ignoring the risk posed by unsecured mobile devices, handhelds and smartphones is no longer an option for corporations. But mobile device management systems are designed for enterprises with big problems and big budgets; expensive mobile device security management systems don't fit within midmarket budgets.

In this tip, Lisa Phifer offers three steps for achieving smartphone and mobile device security and offseting the risks posed by unsecured mobile devices -- and do so within budget.

How to prevent mobile phone spying (see link below)
Your cell phone conversations and wireless activity are not private, and it's important to remember that mobile phone spying is easy; virtually any mobile device activity can be easily intercepted by many people.

In this expert response, resident threat expert Sherri Davidoff explains the methods that attackers use to spy on your phone conversations, and offer tips and advice on how to bulk up your mobile device security to prevent hackers from eavesdropping on your calls.

Mobile device security: The growing threat of mobile malware
(see link below)
Face it: Many wireless handheld devices like PDAs and smartphones are unmanaged and unsecured, making them a prime candidate for attacks and malware infection. And increasingly pervasive use of wireless handhelds in the enterprise should be an obvious reason for malware pros to get serious about mobile malware and mobile device security.

In this tip, Lisa Phifer details all the reasons why smartphone and PDA viruses and malware may be on the rise, and measures enterprises can take to protect the sensitive data they often contain.

This was first published in February 2010

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: