Mobile Security: It’s Not About the Technology


Mobile Security: It’s Not About the Technology

The last few months have drastically increased our reliance on mobile capabilities. Through the increased use of corporate mobile apps, virtual private networks (VPNs), hot spots and more, mobile communications are more critical than ever. Because of this enhanced, unprecedented and sudden dependence on mobile capabilities, mobile security should be at the forefront of everybody’s minds — not just the minds of security professionals.


The next natural step is to match supply to demand, and where there are gaps — or risks — address and monitor them. Understand that when dealing with risk, perfect is often the enemy of good enough, especially in cases where risk is not clearly defined, such as in cybersecurity.

Mobile Security: It’s Not About the Technology

“Mobile devices have rapidly replaced the personal computer at home and in the workplace,” notes Europol. “Our phones or tablets are in fact mini-computers, and should be protected as such. They face the same or even more threats than a PC or a laptop.”

Despite this obvious fact, we still make mistakes. According to the Verizon Mobile Security Index 2020 report, 43 percent of companies surveyed admit they sacrificed security for expediency, convenience or profitability targets, or due to a lack of budget or expertise.

Organisations need to better understand and communicate what needs to be done to accomplish business and security goals, from the top down. But as endpoints proliferate in your organisation’s network, so do opportunities for a security breach.

Today’s Common Threats

Assessments from companies both within and outside of IT security agree that 2020 mobile security threats generally boil down to the following, in no particular order:
Data leakage
Insecure Wi-Fi
Network spoofing
Phishing and social engineering attacks
Poor cyber hygiene, including weak passwords and improper or no use of multifactor authentication (MFA)
Poor technical controls, such as improper session handling, out-of-date devices and operating systems, and cryptographic controls, for the most part, all of these issues are fixable, even as threats evolve. So, why are our networks still getting hammered? Well, go back to the Verizon report: “Speed outweighs security.” The need to meet business targets, whether related to time, money or avoiding cumbersome security tasks, is usually the reason why speed takes priority over security. This should give you a sense of why security operations centres (SOCs) are overwhelmed with alerts.

Understanding Culture and Risk Makes All the Difference

Answer this simple question: Are mobile apps, generally speaking, designed for the purpose of convenience and productivity or security and risk minimisation? If we’re being honest, we know the answer is convenience and productivity.

Now apply the same question to all-around mobile usage. We don’t carry laptops, tablets and phones around because they are less vulnerable and reduce risk; in fact, they are inherently vulnerable and their use increases risk. We use them because they make our lives easier and increase our productivity.

Therefore, how we prevent mobile security threats from harming us and our data, has little to do with what technical solutions we come up with. Instead, it is a question of supply and demand and where we assign value.

Prioritizing What Matters: From Convenience to Data

To reduce the risk of our mobile apps and improve our mobile security posture, the first step is identifying the demand for various commodity mobile capabilities. What types of commodities are we talking about? Well, anything deemed valuable.

This list is by no means exhaustive, but commodities may include:
Network performance, including load, downtime and upgrade
Cross-functional collaboration between business units
Data accessibility, including data classification
Cost and maintenance
The next natural step is to match supply to demand, and where there are gaps — or risks — address and monitor them.
Understand that when dealing with risk, perfect is often the enemy of good enough, especially in cases where risk is not clearly defined, such as in cybersecurity. Therefore, only after having dealt with the big issues should you start to deploy your tactics, which include, but are not limited to:
Whitelisting vs. blacklisting of applications
Bring-your-own-device (BYOD) usage vs. total segregation of all work and personal usage
Network restrictions and associated costs. e.g. an organisation realises it is more expensive to issue hot spots to all its employees, but it is willing to accept that cost to ensure employees only use approved network devices, preventing the use of public or even home Wi-Fi
Endpoint detection and monitoring capabilities privacy and network performance challenges
Mandatory VPN usage as a matter of not only written policy but also technical policy
Mobile device management (MDM) platform configuration, including limiting or even terminating the use of some or all mobile apps and capabilities in general. Given our usage, “mobile security” is just security nowadays. The strategic challenges an organisation faces are the same, regardless of which endpoint is accessing the data. Therein lies the key: In order to have a secure mobile operation, you’re going to have to look at a whole series of issues that are not necessarily technical. Can the 5G supply chain be trusted? What role does the internet of things (IoT) play in the ecosystem? What potential privacy liabilities are there? Is an always-on, always-connected employee really more productive than one who can have a clean break a few hours a day?

Tackling the mobile security issue is complex. You need to start with simple solutions, like getting the basics right, understanding the demands of your business and deciding what risks you want to take on. Address those issues and everything else becomes easier.

LoughTec: Watertight Cyber Security and IT Solutions