Last week I read an interesting article stating the PC is no longer the office primary device for accessing the Internet. With the influx of mobile devices into the enterprise, it is becoming more difficult to enforce corporate policies that are centrally managed. A recent survey by McAfee across [...] 14 nations show 21% of companies have no restrictions on use of personal mobile devices, while 58% have lightweight policies, and only 20% have stringent guidelines. Each of these devices have different OS, software installed and ways of securing them (or none at all). If these devices aren't centrally controlled and have access to everything in the enterprise, it will become a gold mine for those looking for an easy to pick low hanging fruit.
A recent study indicates that Mobile internet traffic is set to grow 400% by 2015 for example, Australia's DSD just released a guide to harden the iOS 4 devices . Incident Response will also become more complex if a mobile device has been compromised and is not owned by the enterprise. I can see Network Forensics becoming a crucial tool to aid reconstructing the events that lead to an incident.
Last year ISC posted a survey on What is your biggest fear with Mobile Devices in your enterprise? and almost 50% of the respondent answered Monitoring for information leak followed with about 20% having issues with Wireless access.If you dont mind sharing, we would like to hear from you our readers, how your organization is currently dealing with Mobile Devices.
Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot edu
Community SANS SEC 503 coming to Ottawa Sep 2011
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.