SlideShare a Scribd company logo
Mobile security blunders and what
     you can do about them
           Ben Rothke, CISSP CISA
              BT Global Services
           Senior Security Consultant
About me….


•     Ben Rothke (too many certifications)
•     Senior Security Consultant – British Telecom
•     Frequent writer and speaker
•     Author - Computer Security: 20 Things Every Employee
      Should Know




BT Americas Inc.               2
Show me the methodology…


• How do you currently handle?
         – Smartphones
         – iPads
         – wireless devices




BT Professional Services      3
Serious security


• In your organization - how does management spell
  security?
• Have they deployed adequate:
         –      staff
         –      budget
         –      processes
         –      oversight




BT Professional Services    4
Why does this matter?



• Wi-fi is everywhere               • mobility is a business
• today’s mobile device is            necessity
  really a desktop                  • the perimeter is porous
• mobile devices are walking        • compliance pressures
  data breaches                     • consumerized technologies
• mobile                              are here to stay
  convenience/benefits are          • past approaches aren’t
  obvious                             working
• attackers focusing on             • social media will be
  mobile devices                      ubiquitous
• weak mobile security              • misconfigurations
         BT Professional Services                            5
Real-world problems


•     loss and theft
•     malware infections
•     intercepted network traffic
•     intellectual property losses
•     no adequate data backups
•     users not being held responsible for security
•     slew of new applications creating risks…




BT Professional Services         6
Scary numbers


• 2010 Information Week Mobile Device Management
  and Security Survey
         – 87% say smartphones will become more predominant in their
           business
         – Security is biggest reason (73%) for deploying mobile device
           management (MDM)
         – Why organizations haven’t deployed MDM:
                   •       Not enough IT staff to support it – 61%
                   •       Too few mobile devices – 34%
                   •       Too expensive – 32%
                   •       Don’t see the need – 26%




BT Professional Services                                7
Recent issues I’ve come across




BT Professional Services   8
Why do we have these problems?


•     mobile devices are new/complex
•     unauthorized usage difficult to prevent
•     improper implementation of controls
•     unstructured files all around
•     failed security policies
•     people not thinking about their choices




BT Professional Services         9
Lots of devices out there to consider


• If it’s got network connectivity and storage, secure it:
         –      smartphones
         –      dumbphones
         –      tablets
         –      netbooks
         –      laptops
         –      mobile storage
         –      wireless networks




BT Professional Services            10
Security audit


•     What’s being stored where
•     passwords
•     encryption
•     malware protection
•     data backups
•     VPN, rdp, gotomypc, etc.
•     wifi weaknesses




BT Professional Services          11
Mobile security best practices


• Management and security
  – Build management and security into the entire mobile security
    product life cycle
  – ensure management tools for mobile devices are interoperable
    with other management infrastructure
• Policy
  – Extend enterprise security policies to mobile and wireless
  – use technologies that provide comparable controls.
     • wireless- and mobile-optimized versions of network access control,
       IDS/IPS, VPN, firewall, data encryption, IDM, DLP, etc.




                                   12
Mobile security best practices


• Security as a requirement
         – Ensure security is a required purchasing consideration for all
           mobile and wireless technology and services
         – require security provisions as a component of all RFP




BT Professional Services                13
BlackBerry security best practices


• Any BlackBerry containing corporate data should be
  managed under BlackBerry Enterprise Server (BES) or
  comparable platform
         – Unmanaged devices can be set by users to be vulnerable to
           login, sync and data access attacks
         – managed BlackBerrys can be guaranteed to comply with strict
           policies
• Ensure you have a uniform set of security capabilities
  across all models that can be managed and audited to a
  guaranteed level of compliance
         – Good news: All BlackBerry models have a common security
           architecture, so this is relatively easy

BT Professional Services              14
iPad/iPhone best practices


• Do they exist?
         – Applications cannot be considered fully secure until they use
           Apple Data Protection APIs
                   • today, only a few applications support them today.
         – of the built-in Apple applications, only Mail currently supports
           the Data Protection API to protect message data/attachments
         – require employee-owned devices to be secured and managed
           by the enterprise
         – deny access to jailbroken or modified devices
         – restrict sensitive data exported to these devices
         – use complex passcodes
         – automatically wipe data after multiple failed login attempts

BT Professional Services                          15
Since no one listens to best practices


• At a bare minimum:
         – All mobile devices should have policies enabled that require
           passwords
         – high priority to encryption on devices where sensitive data will
           be stored.
         – over-the-air kill features used where supported
         – integrated into vulnerability and configuration management
           processes




BT Professional Services                 16
Tools that can help


•   Native security         • MobileIron
•   ActiveSync              • Trust Digital
•   Lookout                 • Good Technology
•   BlackBerry BES             – Enterprise
•   Mobile Active Defense      – Government
                            • 42Gears




          BT                                    17
Future trends


•     little knowledge needed
•     more internal breaches
•     more elaborate hacks
•     more directed hacks
•     physical attacks (stolen devices)
•     broadened attack surfaces
•     mobile business apps
•     Wikileaks
•     directed spear phishing


Copyright (c) 2007, Principle Logic,   18
LLC - All Rights Reserved
Keys to information security success


1.          Getting the right people
2.          Focusing on core issues
3.          Proper testing
4.          Effective metrics
5.          Policies and processes
6.          Right technologies
7.          Incident response
8.          Architecture



BT Professional Services               19
Contact info…


• Ben Rothke, CISSP CISA
• Senior Security Consultant
• BT Professional Services

• www.linkedin.com/in/benrothke
• www.twitter.com/benrothke
• www.slideshare.net/benrothke




BT Professional Services       20

More Related Content

PPTX
Bring Your Own Device (BYOD)
PPTX
An Introduction on Design and Implementation on BYOD and Mobile Security
ODP
PPTX
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
PDF
IOT & BYOD – The New Security Risks (v1.1)
PPTX
BYOD (Bring Your Own Device)
PPTX
BYOD (Bring Your Own Device) Risks And Benefits
PPTX
BYOD: Bring Your Own Device Implementation and Security Issues
Bring Your Own Device (BYOD)
An Introduction on Design and Implementation on BYOD and Mobile Security
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
IOT & BYOD – The New Security Risks (v1.1)
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device) Risks And Benefits
BYOD: Bring Your Own Device Implementation and Security Issues

What's hot (20)

PPTX
Isaca tech session 19 feb 2013 securing mobile devices rev
PDF
Bring Your Own Device (BYOD)
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PDF
Byod security
PDF
Designing a Base Building Network – The Integrator's Role
PDF
Smarter Commerce Summit - IBM MobileFirst Services
PDF
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
PPTX
Aalto cyber-10.4.18
PDF
How to Manage the Great BlackBerry Migration
PDF
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
PPTX
Preparing an Effective BYOD or Mobility Strategy
PDF
Mobile Security in 2013
PPTX
Cybersecurity-Real World Approach FINAL 2-24-16
PPTX
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
PDF
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
PPTX
Security For Business: Are You And Your Customers Safe
PDF
Its not ITs problem
PDF
Innovative software solutions for industry 4.0 (English+Mandarin)
PPTX
Business Case Of Bring Your Own Device[ BYOD]
PDF
Cybercrime Bill 2014: Due Diligence
Isaca tech session 19 feb 2013 securing mobile devices rev
Bring Your Own Device (BYOD)
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Byod security
Designing a Base Building Network – The Integrator's Role
Smarter Commerce Summit - IBM MobileFirst Services
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Aalto cyber-10.4.18
How to Manage the Great BlackBerry Migration
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
Preparing an Effective BYOD or Mobility Strategy
Mobile Security in 2013
Cybersecurity-Real World Approach FINAL 2-24-16
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Security For Business: Are You And Your Customers Safe
Its not ITs problem
Innovative software solutions for industry 4.0 (English+Mandarin)
Business Case Of Bring Your Own Device[ BYOD]
Cybercrime Bill 2014: Due Diligence
Ad

Viewers also liked (18)

PDF
La nécessité de la dlp aujourd’hui un livre blanc clearswift
PDF
Securing your presence at the perimeter
PDF
Rothke computer forensics show 2010
PDF
Securing your presence at the perimeter
PPTX
Rothke rsa 2013 - the five habits of highly secure organizations
PDF
Lessons from ligatt from national cyber security nationalcybersecurity com
PPTX
Rothke rsa 2013 - deployment strategies for effective encryption
PPTX
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
PPTX
E5 rothke - deployment strategies for effective encryption
PDF
Webinar - Getting a handle on wireless security for PCI DSS Compliance
PDF
Interop 2011 las vegas - session se31 - rothke
PDF
The Cloud is in the details webinar - Rothke
PDF
The Need for DLP now - A Clearswift White Paper
PDF
Lessons from ligatt
PDF
Infosecurity Needs Its T.J. Hooper
PDF
Locking down server and workstation operating systems
PPTX
Rothke rsa 2012 building a security operations center (soc)
PDF
Rothke secure360 building a security operations center (soc)
La nécessité de la dlp aujourd’hui un livre blanc clearswift
Securing your presence at the perimeter
Rothke computer forensics show 2010
Securing your presence at the perimeter
Rothke rsa 2013 - the five habits of highly secure organizations
Lessons from ligatt from national cyber security nationalcybersecurity com
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
E5 rothke - deployment strategies for effective encryption
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Interop 2011 las vegas - session se31 - rothke
The Cloud is in the details webinar - Rothke
The Need for DLP now - A Clearswift White Paper
Lessons from ligatt
Infosecurity Needs Its T.J. Hooper
Locking down server and workstation operating systems
Rothke rsa 2012 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ad

Similar to Mobile security blunders and what you can do about them (20)

PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
Embracing iot in the enterprise
PDF
Protecting Data on Laptops
PDF
Cyber security general perspective a
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PPTX
Security Testing for IoT Systems
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PPTX
Mobile Application Security
PPTX
Mobile application securitry risks ISACA Silicon Valley 2012
PPTX
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
PPTX
Internet of Things: Dealing with the enterprise network of things
PPTX
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
PPTX
Outside the Office: Mobile Security
PPTX
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
PDF
BYOD: Device Control in the Wild, Wild, West
PPTX
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
PPTX
The New frontiers in Information Security
PDF
WSO2Con EU 2015: IoT in Finance
PDF
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
PDF
Information Security for Small Business
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Embracing iot in the enterprise
Protecting Data on Laptops
Cyber security general perspective a
Best practices for mobile enterprise security and the importance of endpoint ...
Security Testing for IoT Systems
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Mobile Application Security
Mobile application securitry risks ISACA Silicon Valley 2012
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Internet of Things: Dealing with the enterprise network of things
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
Outside the Office: Mobile Security
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
BYOD: Device Control in the Wild, Wild, West
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
The New frontiers in Information Security
WSO2Con EU 2015: IoT in Finance
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Information Security for Small Business

More from Ben Rothke (11)

PDF
Rothke effective data destruction practices
PDF
Infotec 2010 Ben Rothke - social networks and information security
PDF
Rothke stimulating your career as an information security professional
PDF
Ben Rothke - Effective Data Destruction Practices
PDF
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
PDF
Virtualization, Cloud Computing And The Pci Dss
PDF
Ben Rothke RSA PK 2010
PDF
Rothke Using Kazaa To Test Your Security Posture
PDF
In Sync Network Time Ben Rothke
PDF
Rothke Securing Your Wireless Access Network
PDF
Rothke Articles
Rothke effective data destruction practices
Infotec 2010 Ben Rothke - social networks and information security
Rothke stimulating your career as an information security professional
Ben Rothke - Effective Data Destruction Practices
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Virtualization, Cloud Computing And The Pci Dss
Ben Rothke RSA PK 2010
Rothke Using Kazaa To Test Your Security Posture
In Sync Network Time Ben Rothke
Rothke Securing Your Wireless Access Network
Rothke Articles

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
August Patch Tuesday
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
project resource management chapter-09.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
1. Introduction to Computer Programming.pptx
PPTX
The various Industrial Revolutions .pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Tartificialntelligence_presentation.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Programs and apps: productivity, graphics, security and other tools
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Architecture types and enterprise applications.pdf
August Patch Tuesday
DP Operators-handbook-extract for the Mautical Institute
project resource management chapter-09.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Assigned Numbers - 2025 - Bluetooth® Document
OMC Textile Division Presentation 2021.pptx
1. Introduction to Computer Programming.pptx
The various Industrial Revolutions .pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
O2C Customer Invoices to Receipt V15A.pptx
Hybrid model detection and classification of lung cancer
A novel scalable deep ensemble learning framework for big data classification...
NewMind AI Weekly Chronicles - August'25-Week II
Tartificialntelligence_presentation.pptx
cloud_computing_Infrastucture_as_cloud_p
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Getting started with AI Agents and Multi-Agent Systems
Programs and apps: productivity, graphics, security and other tools

Mobile security blunders and what you can do about them

  • 1. Mobile security blunders and what you can do about them Ben Rothke, CISSP CISA BT Global Services Senior Security Consultant
  • 2. About me…. • Ben Rothke (too many certifications) • Senior Security Consultant – British Telecom • Frequent writer and speaker • Author - Computer Security: 20 Things Every Employee Should Know BT Americas Inc. 2
  • 3. Show me the methodology… • How do you currently handle? – Smartphones – iPads – wireless devices BT Professional Services 3
  • 4. Serious security • In your organization - how does management spell security? • Have they deployed adequate: – staff – budget – processes – oversight BT Professional Services 4
  • 5. Why does this matter? • Wi-fi is everywhere • mobility is a business • today’s mobile device is necessity really a desktop • the perimeter is porous • mobile devices are walking • compliance pressures data breaches • consumerized technologies • mobile are here to stay convenience/benefits are • past approaches aren’t obvious working • attackers focusing on • social media will be mobile devices ubiquitous • weak mobile security • misconfigurations BT Professional Services 5
  • 6. Real-world problems • loss and theft • malware infections • intercepted network traffic • intellectual property losses • no adequate data backups • users not being held responsible for security • slew of new applications creating risks… BT Professional Services 6
  • 7. Scary numbers • 2010 Information Week Mobile Device Management and Security Survey – 87% say smartphones will become more predominant in their business – Security is biggest reason (73%) for deploying mobile device management (MDM) – Why organizations haven’t deployed MDM: • Not enough IT staff to support it – 61% • Too few mobile devices – 34% • Too expensive – 32% • Don’t see the need – 26% BT Professional Services 7
  • 8. Recent issues I’ve come across BT Professional Services 8
  • 9. Why do we have these problems? • mobile devices are new/complex • unauthorized usage difficult to prevent • improper implementation of controls • unstructured files all around • failed security policies • people not thinking about their choices BT Professional Services 9
  • 10. Lots of devices out there to consider • If it’s got network connectivity and storage, secure it: – smartphones – dumbphones – tablets – netbooks – laptops – mobile storage – wireless networks BT Professional Services 10
  • 11. Security audit • What’s being stored where • passwords • encryption • malware protection • data backups • VPN, rdp, gotomypc, etc. • wifi weaknesses BT Professional Services 11
  • 12. Mobile security best practices • Management and security – Build management and security into the entire mobile security product life cycle – ensure management tools for mobile devices are interoperable with other management infrastructure • Policy – Extend enterprise security policies to mobile and wireless – use technologies that provide comparable controls. • wireless- and mobile-optimized versions of network access control, IDS/IPS, VPN, firewall, data encryption, IDM, DLP, etc. 12
  • 13. Mobile security best practices • Security as a requirement – Ensure security is a required purchasing consideration for all mobile and wireless technology and services – require security provisions as a component of all RFP BT Professional Services 13
  • 14. BlackBerry security best practices • Any BlackBerry containing corporate data should be managed under BlackBerry Enterprise Server (BES) or comparable platform – Unmanaged devices can be set by users to be vulnerable to login, sync and data access attacks – managed BlackBerrys can be guaranteed to comply with strict policies • Ensure you have a uniform set of security capabilities across all models that can be managed and audited to a guaranteed level of compliance – Good news: All BlackBerry models have a common security architecture, so this is relatively easy BT Professional Services 14
  • 15. iPad/iPhone best practices • Do they exist? – Applications cannot be considered fully secure until they use Apple Data Protection APIs • today, only a few applications support them today. – of the built-in Apple applications, only Mail currently supports the Data Protection API to protect message data/attachments – require employee-owned devices to be secured and managed by the enterprise – deny access to jailbroken or modified devices – restrict sensitive data exported to these devices – use complex passcodes – automatically wipe data after multiple failed login attempts BT Professional Services 15
  • 16. Since no one listens to best practices • At a bare minimum: – All mobile devices should have policies enabled that require passwords – high priority to encryption on devices where sensitive data will be stored. – over-the-air kill features used where supported – integrated into vulnerability and configuration management processes BT Professional Services 16
  • 17. Tools that can help • Native security • MobileIron • ActiveSync • Trust Digital • Lookout • Good Technology • BlackBerry BES – Enterprise • Mobile Active Defense – Government • 42Gears BT 17
  • 18. Future trends • little knowledge needed • more internal breaches • more elaborate hacks • more directed hacks • physical attacks (stolen devices) • broadened attack surfaces • mobile business apps • Wikileaks • directed spear phishing Copyright (c) 2007, Principle Logic, 18 LLC - All Rights Reserved
  • 19. Keys to information security success 1. Getting the right people 2. Focusing on core issues 3. Proper testing 4. Effective metrics 5. Policies and processes 6. Right technologies 7. Incident response 8. Architecture BT Professional Services 19
  • 20. Contact info… • Ben Rothke, CISSP CISA • Senior Security Consultant • BT Professional Services • www.linkedin.com/in/benrothke • www.twitter.com/benrothke • www.slideshare.net/benrothke BT Professional Services 20