• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Mobility   »   BYOD advice for mobile users: have you thought about security?

BYOD advice for mobile users: have you thought about security?

  • Posted on:July 10, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
1

Video post based on Trend Micro interviews at the Mobile Convention Amsterdam 2012 – Part 1.

We all love our smartphones and tablets. And we all love those little mobile apps that make our devices so unique, useful, and fun. But have you ever thought about how safe they are? Should you trust your smartphone to shop online? Is it safe to access you bank account from your tablet? Is it ok to check your corporate email from your mobile phone? Should you trust the device manufacturer? Should you trust the app developer? Do you need mobile security software – as you know you do for your PC?

Trend Micro interviews at the Mobile Convention in Amsterdam reveal a general lack of education with regard to the security risks posed by mobile devices. Some people believe a pin code is all they need — but then admit not using one. Others believe a regular backup is enough. Others trust the device itself. Most are quite candidly clueless.

So, what are the recommendations for mobile users, especially when they use their personal mobile devices for work? Here is a set of basic security rules that you may want to consider:

  • Make sure you have passwords for the device and passwords for the various applications such as email and online accounts. I know that typing passwords on a small keyboard, on a small device, on the go, is not that simple. But I would definitely recommend it as a first line of defense.
  • Pay attention to the operating system and to your applications and make sure they are always up to date. Keeping your device and your apps updated really solves most of the security flaws that vendors identify and fix on a regular basis.
  • Very important: pay attention to what applications you download and install in your mobile device. You may have an Apple iOS device such as an iPhone or and iPad. Or you may have a Google Android device such as a Galaxy Tab or similar. Although these devices are not exposed to the same threats, one simple concept applies to them all: pay attention from who you get your applications from. Not all websites and app stores have a good reputation. Pay attention to name and reputation of the software developer. There have been situations where vendor names have been spoofed, so that end users are led to install malicious apps instead of the genuine one. A good mobile security software detects these rogue apps and alerts you of dangerous websites known for spreading malware.
  • Special note for Android users: pay attention to the permissions required by the application during the installation phase. If you are installing a video game and the app requires permission to access your phone book and to send text messages, that looks fishy. You may want to reconsider installing that app.
  • Special note for Apple iOS users: do not jailbreak your iPhone or iPad. A jailbroken device is not a secure device. While jailbreaking in itself doesn’t represent a security issue, it makes the all system much more vulnerable to poorly written code or plain malicious apps. Think about it: If the device can be jailbroken, by definition it can be exploited — the jailbreaking procedure itself is in itself an exploit.
  • Final recommendation: beware the dark side of BYOD – privacy, personal data loss and device seizure. Make sure you fully understand your company’s Acceptable Use Policy and the implications of using your personal device for work.

NEXT: BYOD advice for IT managers: is consumer mobile technology as secure as you thought?

Related posts:

  1. BYOD advice for IT managers: is consumer mobile technology as secure as you thought?
  2. The Financial Impact of Consumerization – It’s official: BYOD boosts productivity
  3. The Consumerization University – Day 4: Mobile security matters
  4. The Consumerization University – Day 3: BYOD challenges for corporate IT

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Trend Micro Asks Students How Their Relationship to the Internet Has Changed During COVID-19
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.