Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/20/2010
12:59 PM
50%
50%

Interop: Enterprises Lax On Mobile Security

Most corporations treat smartphones as second-class citizens when it comes to protecting against threats and vulnerabilities, panelists say.

Companies that are normally buttoned down when it comes to IT security are failing to apply the same safeguards to their mobile devices and infrastructures, according to experts who spoke on a panel Wednesday at the Interop IT Conference and Expo in New York City.

"I don't think enterprises are a taking mobile security seriously enough," said InformationWeek.com editor in chief Alex Wolfe. "In a lot of businesses, smartphone provisioning is the province of low-level clerks," said Wolfe.

Part of the problem, Wolfe said, is that to date most high-profile security breaches, like a 2006 incident that hit credit bureau Equifax, have involved stolen laptops or hacked networks—but that's going to change as mobile devices achieve greater penetration in the enterprise. "We're going to have breaches, and there's going to be finger pointing," said Wolfe.

Another issue is that, with the possible exception of RIM's BlackBerry, most mobile devices are designed with consumers in mind, and don't offer the security management features commonly found on business PCs and servers. "The vendors are going where the money is," said moderator Paul DeBeasi, a research VP at Gartner.

To reduce mobile vulnerability, enterprises may have to limit the number of operating systems they support in order to achieve a manageable footprint. That means workers may have to settle for the tried and true BlackBerry rather than the latest iPhone or Android phone—at least when it comes to mission critical applications and sensitive data.

"Whether or not you can appease the guy who wants an iPhone with a touch-screen BlackBerry, some guys are just going to have to take it" said Michael Brandenburg, technical editor at TechTarget.

Regardless of which device employees are carrying, enterprise security pros can ensure their mobile environments are locked down by treating smartphones as they would any other computer on their network.

"A lot of the rules that apply to your laptop should apply to your BlackBerry or your iPad," said panelist Craig Mathias, principal at consulting firm Farpoint Group.

Interop, hosted by InformationWeek.com publisher UBM Techweb, runs through Oct. 22 at the Javits Center on Manhattan's West Side.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24259
PUBLISHED: 2021-05-05
The “Elementor Addon Elements� WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24260
PUBLISHED: 2021-05-05
The “Livemesh Addons for Elementor� WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24261
PUBLISHED: 2021-05-05
The “HT Mega – Absolute Addons for Elementor Page Builder� WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by ...
CVE-2021-24262
PUBLISHED: 2021-05-05
The “WooLentor – WooCommerce Elementor Addons + Builder� WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-priv...
CVE-2021-24263
PUBLISHED: 2021-05-05
The “Elementor Addons – PowerPack Addons for Elementor� WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scriptin...