Marc Saltzman
Why You Can't Ignore iPhone / iPad Security
It wasn't too long ago that Apple was a mere blip in a Windows-dominated world. At least its modest market share meant Apple products flew under most cybercriminals' radars.
But now that Macs are hot again, we're hearing more about malware attacks like the MacDefender scareware. And with Apple's monstrously successful iPhone and iPad product lines, there's a growing concern that these iOS devices could also be an obvious target for tech-savvy thieves -- and pose a threat to an entire corporate network.
Should You Ban Consumer Devices?
Before allowing iOS devices into the organization, IT must educate employees about the risks, use tools to safeguard company data and develop policies that can reduce the odds of a security breach. Or should you just ban consumer devices altogether?
"Your company should not develop policies that exclude iOS devices," says Kevin Sterneckert, research vice president at the Gartner research and consulting group, based in Stamford, Conn. "Your employees are going to use these devices with or without permission. And with the latter, it could expose your network to major security breaches."
In fact, allowing users to choose the device they want has its benefits. "It could be less expensive for the company if they're not paying for a device," adds Sterneckert, "so we're seeing more of a ‘You bring the device, and we'll provide the service' kind of scenario in the workplace today."
What You Can Do
Sterneckert says there are three behaviors every company should adopt:
1. Require passcode usage.
Your end users should use the four-digit PIN on the iPhone and iPad, plus an auto-wipe option that deletes data after a few incorrect login attempts.
2. Encrypted backup.
Make sure you're using this added layer of security on the local workstations to which the iOS devices are connected. "This will protect and secure all data on the device," says Sterneckert.
3. Use Find My iPhone.
Ensure the Find My iPhone service (free) is enabled, so a lost or stolen device can be located remotely and/or wiped clean.
Microsoft Exchange ActiveSync is also recommended for email. "The challenge is to make sure you put the right guardrails around environments, like email and Web use, that include the right permissions, certificates and keys," says Sterneckert. "Apple has done a great job at that."
The Importance of Usage Policies
IT departments should also create policies based on the company's needs and/or industry's regulations. Make sure people understand their importance and why they're in place. For example, it's possible to limit the downloading of applications from iTunes, disable the iPhone or iPad's cameras or curb corporate Wi-Fi use for personal reasons.
It is incumbent upon businesses to develop these policies, but it's not yet highly prevalent among small and midsized businesses, says Tim Bajarin, president of Creative Strategies, a firm based in Campbell, Calif., that provides industry analysis for the tech sector.
Bajarin estimates that less than half of small businesses have formal IT policies in place. "Even when they do, they struggle to enforce them, given the mix of corporate and employee-owned devices across multiple platforms and device categories -- although there's policy management features available through mobile email servers," he adds.
But not only should you establish a usage policy, you need to offer periodic reminders and education about the security risk too. "These policies should also encompass use of employee-owned devices to access company data -- things like mandatory password use, reporting lost/stolen devices or data and avoidance of removable storage are the bare-bones minimum," says Bajarin.
Photo Credit: @iStockphoto.com/ymgerman
Twitter: @ihavenet
- How Apple's iCloud Changes Business
- Use the Cloud to Go Mobile
- Apple iPad 2: A Smarter Business Tool
- Why You Can't Ignore iPhone / iPad Security
- Should You Let Your Teens Blog?
- Should You Talk Politics Online?
- How to Watch TV for Free -- or Close to It
- The Cost of Paying for Netflix
- Future for Slates, Tablets and iPads
- Social Media and Privacy (or Lack Thereof)
- Small Business Video: Life After the Flip
- Is It Safe to Post Photos Online?
- 9 Ways to Avoid Online Scams
- LinkedIn Offers New Options for Students
- 4 Strategies to Avert Virtual Arguments
- Cloud Computing 101: Protect Yourself Online
- How to Recover From a Social Media Mistake
- Why You Should Inventory Business Cloud Use
- Emerging Technology Has Positive Impact in Classroom
- 4 Apps to Manage Your Contacts
- Portable Tech Gadgets You Need This Summer
- Best Tablets for Your Business
- Security Tips for Your Smartphone or Tablet
- 5 New Cloud Tools You'll Love
- Can a Tablet Replace Your Laptop?
- Why Wireless Needs a Network of Networks
- 5 Steps to a Successful Enterprise Wireless Strategy
- 5 Keys for Moving Enterprise Security to the Cloud
- Tips for Building and Deploying Cloud-based Apps
- 5 Business Lessons You Can Learn From Mark Zuckerberg
- Russia: The No. 1 Base of Global Internet Attacks
- Researchers Say New Botnet TDL-4 Poses Big Threat
- The Internet Grows Up
- Ten Ways to Keep Your Online Information Secure
- How Facebook and Your Free Time Can Get You Fired
- The Only 10 Android Health Apps You Need
- Connected TV
- Near-Field Communication Technology the Next Big Thing
- The Future of 3-D Video
- Is Your Teen Sexting?
- Should You Ban Your Tweens From Facebook?
- Home Movies: Then and Now
- Is Social Media Malware Infecting Your Business?
- Is Your Tween (Illegally) on Facebook?
- Are Free Public Wi-Fi Networks Safe?
- Explosion of Creativity: Power of Online Communities
- The Future According to Google
- 5 Cheap Alternatives to Hiring a Personal Trainer
- When Your Dream Company is Hiring on Twitter
- Colleges Bring Campuses to Facebook
- Technology Powers Revolutions and Saves Lives
- Best Photo Apps
- Virtual World No Substitute for Real One
- Best Phone Apps for Busy Women
- How to Prevent Identity Theft
- How to Use Facebook So It Does not Use You
- Worst-case Computer Scenarios
- Google Chrome OS Notebook: A Security Game Changer?
- What Is Cloud Computing?
- How to Prevent Data Breaches
- Best Tips for Sharing Videos
- Do You Need an iPad for Your Small Business?
- The App Guide: 5 Must-have Shopping Apps
- Project Management Tips From the Pros
- Finding the Right Skill Set
- Who's Gawking at Your Photos?
- Dealing With Virtual Stalking
- CES 2011 Report - Consumer Electronics Show
- Time to Gear up for 3-D TV?
- How to Get the Best Service From IT Vendors
- Dating Apps: The Lowdown
- New Website Streamlines College-Aid Application
- Gift-card Resale Market Thrives Online
- Stop Cyberbullying Now!
- 5 Cloud Tools to Boost Your Productivity
- Mobile Pay Can Give You an Edge
- How to Find the Best Deals Online
- Should You 'Friend' Your Teens Online?
- Should You Really Post That Comment?
- 5 Smart Tactics for LinkedIn Self-Promotion
- How Repressive Regimes Use the Internet to Keep Power
- WikiLeaks: Diplomacy as Usual
- The Rising Threat of USB Drives
- Integrate Cloud Solutions With Caution
- Tech Solutions to Track Your Resolutions
- Crash Course in Computer Maintenance
- How to Pick the Right Cloud Provider
- Web Tools for Starting a Small Business
- 4 Life-changing Resolutions You Can Stick to
- Create Your Own Social Network
- What the Web Says About You
- FTC Chairman: 'Do Not Track' Rules Would Help Web Thrive
- 'Do Not Track' Rules Would Put a Stop to the Internet As We Know It
- Are Federal 'Do Not Track' Rules Needed?
- The Political Power of Social Media
- Top 3 Kid-safe Social Networks
- 5 Ways to Cultivate Your Kids' Online Reputation
- Preparing Our Children for Global Digital Citizenship Success
- The Great E-reader Roundup
- The NFL's Highest-scoring Apps
- New Gadgets Straight From the Big Screen
- A Game Plan for Protecting Stored Data
- The Drive for Real-time Collaboration
- Hang Onto People Who'll Help You Advance
- Leading New Developments in Visual Computing
- Meet Mr. Industrial: Justin Lassen's Music Machine
- Must-see TV on the Internet
- Share Safely on Social Networks
- 6 Essential Rules for Safe Online Shopping
- Five Steps to Kid-friendly Surfing
- High-tech Help for Weight Loss
- Create a Web Site or Blog for Your Family
- Video Eyewear for Sunglass Cinema
- Smart Phone Apps Help Stop Distracted Driving
- Online Computer Backup Services Remove Hassle
Copyright © 2011 Studio One Networks. All rights reserved.