Managing IT risk associated with mobile computing security

Jon Oltsik

When BYOD was coming to fruition a few years ago, it had a sudden and deep impact on IT risk.  Why?  Many CISOs I spoke with at the time said it was purely a matter of scale.  All of a sudden, large enterprises had thousands of additional devices on their networks and they struggled to figure out what these devices were doing and how these activities impacted organizational risk.

ESG recently published a new research report titled, The State of Mobile Computing Securitythat looks at mobile computing security holistically across devices, applications, data, and IT security operations.  Based upon this research, it appears to me that security issues around mobile computing have been way overstated.  The ESG research indicates that mobile computing risk is really associated with:

1.  Basic IT operations blocking and tackling.  Enterprise organizations realize that it is risky to let unknown and unmanaged devices frolic around their networks at will.  To mitigate this risk, many organizations have created cross-functional mobile computing tiger teams within IT, but the ESG research indicates that these groups are dominated by the IT operations team.  In fact, 39% of enterprises say that IT operations is responsible for mobile computing security as compared to 26% of organizations claiming that the IT security group is responsible for mobile computing security.  Why does IT operations participate more than the security team?  Because the primary security tasks are IT operations-centric such as onboarding users, configuring devices, creating/enforcing network access policies, etc.  Little wonder then why MDM and vendors like Citrix (Zenprise), Good Technology, IBM (Fiberlink), MobileIron, and VMware (AirWatch) dominate the mobile security headlines. 

2.  Data security.  When asked to identify mobile computing security challenges, 43% of security professionals point to "protecting data confidentiality and integrity when sensitive data is accessed by a mobile device over the network," while 41% say, "protecting data confidentiality and integrity when sensitive data is stored on a mobile device."  These results shouldn't be a surprise, we've been struggling with discovering, classifying, and protecting sensitive data since companies decided to process departmental data on Digital VAX systems rather than putting all of their MIS eggs in the IBM mainframe basket.  Of course mobile computing exacerbates this risk but mitigation comes down to user training, acceptable use policies, security controls, and strong monitoring.  Nothing new here.

3.  Mobile application development.  ESG research reveals that 42% of enterprise organizations are developing a "significant amount" of mobile applications while another 38% are developing a "modest amount" of mobile applications.  These mobile apps vary - 45% of organizations are developing hybrid applications, 41% are building native iOS apps, and 39% are coding with HTML 5.0.  The scary thing here is that less than half of organizations are currently including best practices for secure application development.  For example, 47% of organizations say they perform static application software testing as part of mobile application development, 47% claim they train their mobile application developers on secure application development best practices, and 47% perform dynamic application testing as part of mobile application development.  Pardon the pun but given this situation, insecure mobile applications may become a Trojan horse for future security problems.  CISOs must identify this vulnerability but it is up to the applications development team to mitigate the risk.

1  2  Next Page