Enterprise Mobile Device Protection from Viruses
Compliance policies aimed at securing corporate data and applications accessed by mobile devices have to address hacking, viruses and other malicious entities. Take a look at the various aspects of mobile devices that are vulnerable to hackers, and what you can do to protect the devices and data on them:
Malicious apps: Certain apps can steal information from the device and relay it back to a hacker’s server. Information that can be stolen includes the contacts, calendar, messages, and other content stored on the device.
Several apps prompt users to allow them to access their GPS location, for example. Allowing GPS access to an app provides crucial information about where the device and its owner are at any point in time, putting data at risk because the device could be physically stolen. It's critical to monitor the behavior of apps and weed out the ones that are malicious.
Spam: Mobile devices are susceptible to receiving spam in several forms, including text messages, instant messages, and e-mail, and via online games. These are all ways in which spammers target device owners. The spam messages are typically solicitations for products or services, often fraudulent.
Worms, viruses, and Trojans: Just like on Windows PCs, software viruses can affect mobile devices and replicate by sending copies of themselves to all contacts found in the address book. Devices can receive such files via SMS, MMS, e-mail, Bluetooth, or any of the plethora of the available communication methods.
From a compliance perspective, here’s a list of items that you should consider enforcing on mobile devices in your corporate network:
Comprehensive antivirus protection, with automatically updated virus signatures to protect against Trojans, worms, and other threats
Antispam protection, with the ability to automatically delete spam
Antimalware protection, to detect malicious apps that suspiciously track user information via GPS
Firewall protection, to set traffic filters that control the traffic flowing into as well as out of the device.
Not having such software is akin to letting your users connect to your corporate network from computers that have no security software (like antivirus or antispyware). You’d never let that happen, so why allow mobile devices to be able to connect without similar protection?
As for personal versus corporate-assigned devicess, you should enforce the virus protection on both types of devices, just like you would on both home computers and corporate laptops.
Applications like antivirus protection usually affect the battery life of a device. Be sure to analyze the effects on battery life when you shop around for mobile device antivirus solutions.
Most antivirus software products work off virus signatures that are regularly updated by the vendor. Look for solutions where the virus signatures are automatically updated from the vendor to each device. You can’t expect the device user to manually update the virus signatures.