Skip to main content

Is Your Smart Phone Security Smart?

With the ever increasing popularity, sophistication and internet-ready nature of many mobile phones, comes an increased risk from data loss, identity theft and general costly misuse.  Over 5000 mobile phones are allegedly stolen each day in the UK, not to count the many attempts at 'hacking', 'cracking' and remote attacking.

A mobile phone is no longer just that.  It's a web browser.  It's a camera.  It's a calendar and personal organiser.  It's a data store.  In combination with the several thousand apps available for the various platform types, it's also a utility capable of once cumbersome and time consuming tasks, games and activities.  Hence the newly termed 'smart' phone.  This object in your back pocket is basically a tiny laptop.


Most smart phones will generally have some basic security measures built in, such as a console lock which is pin protected.  Is this used?  Is it ever changed?  A recent survey by Vodafone suggested that 50% of users don't change the pin regularly.  The pin itself is more of a physical measure to act as a deterrent to thieves and opportunistic call making.





However, there are other risks other than physical.  What about hacking?  Most smart phones can connect to a wifi network just like a laptop, but a phone is more likely to be carried and moved and therefore in contact with multiple networks through out the course of a day.  Most phones allow wifi scanning and auto-connection, especially to well known network and hotspot names.  Once connected the phone will more than likely attempt to download email messages, update social networking activities and so on.  All of which pose a threat, either from packet sniffing of the network traffic or even introducing remote malware and phone manipulation from the untrusted network.

Due to the high value of phone data - thinking primarily personal contact information - the risk of malware proliferation is high, not to mention the cost of stealing individual contact records.  The rise of the smart phone for business use and the 'always-connected' culture, leads to many phones being used for email.  Whilst from a security perspective sometimes only the header is downloaded, many use IMAP causing a local copy of the mail to be stored on the memory card of the phone, increasing the risk of theft or duplication.

The rapid increase in the number of mobile phone applications or apps, has lead to concerns surrounding software quality and assurance.  Whilst many vendor supplied app portals like Apple's iTunes store or Nokia's Ovi Store provide a vendor and basic product vetting process (use of signing, QA etc) it is still very easy for an indie-developer with no history to create a multi-thousand customer app.  Independent portals such as GetJar also allow a quick and simple way for developers to promote tooling without a great deal of testing performed from a security perspective.

As phones become increasingly powerful and start to resemble the 'netbooks' of tomorrow, the reliance of a fully fledged mobile operating system will allow more sophisticated anti-viral and anti-malware techniques to be employed.  Hopefully this will enhance mobile security, and not reduce the vigilance and approach of the user.

Popular posts from this blog

Top 5 Security Predictions for 2016

It's that time of year again, when the retrospective and predictive blogs come out of the closet, just before the Christmas festivities begin.  This time last year, the 2015 predictions were an interesting selection of both consumer and enterprise challenges, with a focus on:


Customer Identity ManagementThe start of IoT security awarenessReduced Passwords on MobileConsumer PrivacyCloud Single Sign On
In retrospect, a pretty accurate and ongoing list.  Consumer related identity (cIAM) is hot on most organisation's lips, and whilst the password hasn't died (and probably never will) there are more people using things like swipe login and finger print authentication than ever before.

But what will 2016 bring?


Mobile Payments to be Default for Consumers

2015 has seen the rise in things like Apple Pay and Samsung Pay hitting the consumer high street with venom.  Many retail outlets now provide the ability to "tap and pay" using a mobile device, with many banks also offer…

Customer Data: Convenience versus Security

Organisations in both the public and private sector are initiating programmes of work to convert previously physical or offline services, into more digital, on line and automated offerings.  This could include things like automated car tax purchase, through to insurance policy management and electricity meter reading submission and reporting.

Digitization versus Security

This move towards a more on line user experience, brings together several differing forces.  Firstly the driver for end user convenience and service improvement, against the requirements of data security and privacy.  Which should win?  There clearly needs to be a balance of security against service improvement.  Excessive and prohibitive security controls would result in a complex and often poor user experience, ultimately resulting in fewer users.  On the other hand, poorly defined security architectures, lead to data loss, with the impact for personal exposure and brand damage.

The Role of Identity Management in the GDPR

Unless you have been living in a darkened room for a long time, you will know the countdown for the EU's General Data Protection Regulation is dramatically coming to a head.  May 2018 is when the regulation really takes hold, and organisations are fast in the act on putting plans, processes and personnel in place, in order to comply.

Whilst many organisations are looking at employing a Data Privacy Officer (DPO), reading through all the legalese and developing data analytics and tagging processes, many need to embrace and understand the requirements with how their consumer identity and access management platform can and should be used in this new regulatory setting.

My intention in this blog, isn't to list every single article and what they mean - there are plenty of other sites that can help with that.  I want to really highlight, some of the more identity related components of the GDPR and what needs to be done.

Personal Data On the the personal data front, more and more org…