11.01.2014 Views

to Overcome Vulnerabilities in Your DSD Mobile Security Strategy

to Overcome Vulnerabilities in Your DSD Mobile Security Strategy

to Overcome Vulnerabilities in Your DSD Mobile Security Strategy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5 Ways <strong>to</strong> <strong>Overcome</strong> <strong>Vulnerabilities</strong> <strong>in</strong> your<br />

<strong>DSD</strong> <strong>Mobile</strong> <strong>Security</strong> <strong>Strategy</strong><br />

Introduction<br />

Thanks <strong>to</strong> advances <strong>in</strong> mobile technology, you hold a world<br />

of <strong>in</strong>formation <strong>in</strong> your hands. Merely a decade ago, the notion<br />

of hold<strong>in</strong>g a full-powered computer <strong>in</strong> your palm was a novel<br />

idea. Today, it’s your bus<strong>in</strong>ess partner—and productivity would<br />

plummet without it.<br />

Anyone who works <strong>in</strong> the direct s<strong>to</strong>re delivery (<strong>DSD</strong>) environment<br />

understands the value <strong>in</strong> the progression of mobile technology<br />

and wireless access. The pre-sale environment is <strong>in</strong>creas<strong>in</strong>gly<br />

def<strong>in</strong>ed by low-cost wireless order transmission. And a delivery<br />

process that used <strong>to</strong> require 48 hours has been slashed <strong>in</strong> half,<br />

driv<strong>in</strong>g the market—<strong>in</strong>clud<strong>in</strong>g your cus<strong>to</strong>mers—<strong>to</strong> demand<br />

faster, more accurate and more cost-effective service. The <strong>DSD</strong><br />

distribution cha<strong>in</strong>, from plants <strong>to</strong> wholesaler warehouses and sales<br />

departments, <strong>to</strong>day <strong>in</strong>sists on <strong>in</strong>creased productivity and near<br />

real-time communications: on-the-spot messag<strong>in</strong>g capabilities so<br />

products flow <strong>to</strong> the right places, exactly when they’re needed and<br />

<strong>in</strong> the precise quantities desired.<br />

While the rewards of mobile sales and delivery management<br />

are notable, there are new risks <strong>to</strong> consider. In fact, the risks<br />

related <strong>to</strong> mobile devices are <strong>in</strong>creas<strong>in</strong>g. There are more and<br />

more attacks aimed at snoop<strong>in</strong>g wireless 802.11 (“WiFi”)<br />

communications and Blue<strong>to</strong>oth® technology (a wireless<br />

standard for short-range data shar<strong>in</strong>g), and an <strong>in</strong>creas<strong>in</strong>g<br />

number of worms and viruses target<strong>in</strong>g mobile operat<strong>in</strong>g<br />

systems. Just as viruses, worms, and spyware evolved, from<br />

target<strong>in</strong>g floppy disks and spread<strong>in</strong>g through shar<strong>in</strong>g files <strong>in</strong> the<br />

1980s <strong>to</strong> exploit<strong>in</strong>g e-mail and the Web <strong>in</strong> the 1990s, attackers<br />

will cont<strong>in</strong>ue <strong>to</strong> follow technology wherever it goes. <strong>Your</strong><br />

bus<strong>in</strong>ess needs <strong>to</strong> have the right defenses <strong>in</strong> place <strong>to</strong> protect<br />

aga<strong>in</strong>st these threats—malicious viruses, eavesdroppers and<br />

attack exploits that threaten the <strong>in</strong>tegrity and confidentiality of<br />

your <strong>in</strong>formation.<br />

Networks are built <strong>to</strong> facilitate the ease of communication.<br />

They’re based on standards that aim <strong>to</strong> enable the free flow<br />

of <strong>in</strong>formation and access from anywhere. But this <strong>in</strong>creases<br />

complexity and makes them quite vulnerable <strong>to</strong> those who<br />

would tap <strong>in</strong> and destroy data—just because they can. However,<br />

with the right set of <strong>to</strong>ols and proper management, the<br />

potential for danger can be dim<strong>in</strong>ished dramatically. But it does<br />

take an ongo<strong>in</strong>g commitment <strong>to</strong> security.<br />

Because mobile technology leaves the relative security, stability<br />

and comfort found beh<strong>in</strong>d the corporate bricks and mortar, your IT<br />

department must manage and update handheld systems properly.<br />

Every effective security strategy and technology that protects the<br />

core company network and systems can be applied <strong>to</strong> each device,<br />

no matter how small, mobile or dedicated its function.<br />

What You Will Learn <strong>in</strong> This Report<br />

This report highlights the five most common vulnerabilities<br />

that weaken mobile IT security for many bus<strong>in</strong>esses, and what<br />

you should do <strong>to</strong> overcome them. It underl<strong>in</strong>es the importance<br />

of establish<strong>in</strong>g a specific mobile security strategy and describes<br />

the technologies and processes that should be implemented<br />

<strong>to</strong> help ensure device connectivity and availability rema<strong>in</strong> high,<br />

and that the <strong>in</strong>formation resid<strong>in</strong>g on these devices stays private<br />

and secure.<br />

Five Ways <strong>to</strong> <strong>Overcome</strong> <strong>Vulnerabilities</strong><br />

<strong>in</strong> <strong>Your</strong> <strong>DSD</strong> <strong>Mobile</strong> <strong>Security</strong> <strong>Strategy</strong><br />

1 Lack of a Cohesive <strong>Mobile</strong><br />

<strong>Security</strong> Policy<br />

Just as your IT department has security policies <strong>in</strong> place for<br />

corporate servers, desk<strong>to</strong>ps and notebooks, (such as regularly<br />

patch<strong>in</strong>g software, updat<strong>in</strong>g firewall rules and hav<strong>in</strong>g anti-virus<br />

protection <strong>in</strong> place) the same scrut<strong>in</strong>y must be given <strong>to</strong> all<br />

mobile devices that carry and transmit company <strong>in</strong>formation.<br />

The first step is <strong>to</strong> <strong>in</strong>ven<strong>to</strong>ry all mobile devices <strong>in</strong> the field, who<br />

is assigned <strong>to</strong> each, and how they’re be<strong>in</strong>g used. The goal is<br />

<strong>to</strong> establish a basel<strong>in</strong>e security framework <strong>to</strong> ensure that the<br />

devices and <strong>in</strong>formation are properly ma<strong>in</strong>ta<strong>in</strong>ed, and that they<br />

m<strong>in</strong>imize risk <strong>to</strong> the corporate network and applications when<br />

they connect.<br />

Vital aspects of your policy should <strong>in</strong>clude:<br />

• Decid<strong>in</strong>g which devices and/or users will be permitted <strong>to</strong><br />

connect <strong>to</strong> <strong>in</strong>ternal applications and communication servers<br />

and how they’re authenticated (by the device, assigned IP<br />

address, and/or username and password, etc.)<br />

• Establish<strong>in</strong>g policies on password strength (how many<br />

characters, how many need <strong>to</strong> be upper-case, the mix of<br />

numbers and letters, etc.)<br />

• Determ<strong>in</strong><strong>in</strong>g how data will be protected (encryption,<br />

password access <strong>to</strong> the device, etc.) on the device<br />

• Establish<strong>in</strong>g security dur<strong>in</strong>g transmission. If you’re rely<strong>in</strong>g<br />

on a private network carrier that encrypts data transmission,<br />

you may already have this vulnerability solved. If users<br />

connect remotely from WiFi hotspots, or transmit by<br />

synchroniz<strong>in</strong>g from remote PCs, you’ll want <strong>to</strong> consider<br />

deploy<strong>in</strong>g a virtual private network (VPN).<br />

2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!