White
Paper
Three
Steps
To
Mitigate
Mobile
Security
Risks
1
2
Bring
Your
Own
Device
Growth
The
“Bring
Your
Own
Device”
(BYOD)
trend
caught
on
with
users
faster
than
IT
expected,
especially
as
iOS
and
Android
devices
became
dominant.
In
a
January
2012
market
research
study,
71
percent
of
the
businesses
surveyed
said
that
mobile
devices
have
caused
an
increase
in
security
incidents.
The
“Bring
Your
Own
Device”
(BYOD)
trend
started
in
late
employee
devices,
including
corporate
email
(79
percent),
2009
and
caught
on
with
users
faster
than
IT
expected,
customer
data
(47
percent)
and
network
login
credentials
especially
as
iOS
and
Android
devices
became
dominant.
(38
percent).
Today,
a
majority
of
companies
have
employees
bringing
Given
that
the
BYOD
trend
is
set
to
accelerate,
this
white
their
own
smartphones
and
tablets
to
work.
While
there
paper
will
help
you
better
understand
the
underlying
risks
have
been
clear
employee
productivity
gains
from
BYOD,
a
associated
with
these
devices,
and
provide
a
simple
step-‐
negative
by-‐product
is
the
significant
growth
in
data
by-‐step
approach
to
mitigate
their
risks.
The
paper
relies
on
security
risk.
In
a
January
2012
market
research
study
by
data
garnered
from
m ore
than
130
m illion
device
Checkpoint
Software,
71
percent
of
the
businesses
connection
events,
and
this
mobile
device
usage
data
was
surveyed
said
that
m obile
devices
have
caused
an
increase
collected
from
companies
involved
in
the
trial
program
for
in
security
incidents,
citing
significant
concerns
about
the
Mobilisafe’s
Mobile
Risk
Management
product.
loss
and
privacy
of
sensitive
information
stored
on
IT
managers
significantly
underestimated
the
number
and
kinds
of
mobile
devices
connecting
to
their
network.
Causes
Of
The
Risks
A
key
conclusion
from
this
study
was
that
IT
managers
significantly
underestimated
the
diversity
of
mobile
devices
connecting
to
their
network.
Even
though
these
IT
managers
had
serious
concerns
about
data
risk
from
these
mobile
devices,
they
did
not
feel
they
had
adequate
tools
to
determine
those
risks
and
respond
to
them.
Some
key
supporting
data
from
the
study:
• On
average,
more
than
80
percent
of
employees
were
already
using
smartphones
and
tablets
• A
new
device
model
was
introduced
to
a
company
for
every
seven
employees
• 56
percent
of
iOS
devices
were
running
outdated
firmware
• 39
percent
of
total
authenticated
devices
were
inactive
for
more
than
30
days,
prompting
concerns
and
conversations
with
employees
about
lost,
sold
or
otherwise
misplaced
devices
with
employee
credentials
and
sensitive
corporate
data
Pervasiveness
Of
The
Risks
The
study
also
showed
that
businesses
were
exposed
to
high
severity
vulnerabilities
from
the
increased
usage
of
these
mobile
devices.
IT
managers
could
not
keep
up
with
the
rate
of
discovery
of
severe
vulnerabilities
these
devices
brought
to
their
corporate
network,
and
lacked
a
standardized
approach
to
mitigate
these
risks
given
the
complexity
of
the
mobile
ecosystem,
consisting
of
manufacturers,
Operating
System
(OS)
providers
and
carriers.
Some
key
supporting
data
from
the
study:
• 71
percent
of
devices
in
the
study
contained
high
severity
operating
system
and
application
vulnerabilities
• A
new
vulnerability
was
mapped
on
average
to
m obile
devices
every
1.6
days,
which
is
4x
faster
a
discovery
rate
Device
Usage
Has
Exploded
than
in
2011
• 38
different
OS
versions
in
the
study
contained
high
severity
On
average,
more
than
80%
of
vulnerabilities
employees
are
already
using
smartphones
and
tablets
• There
would
be
a
4x
drop
in
the
percentage
of
devices
with
severe
vulnerabilities
if
the
devices
were
updated
to
the
latest
available
firmware
1
2
In
today’s
BYOD
world,
companies
need
to
shift
from
a
legacy
control-‐oriented
approach
to
a
risk
management-‐
oriented
approach.
Consequences
Of
The
Risks
networks.
Corporate
data
is
also
frequently
stored
on
the
device,
and
in
many
cases
the
OS
itself
enhances
security
risk.
As
mobile
device
usage
grows,
the
security
risk
to
company
All
these
create
security
risks
that
require
a
fundamentally
data
from
these
devices
also
increases.
Application
and
new
way
for
organizations
to
approach
mobile
device
security.
operating
system
vulnerabilities
on
mobile
devices
are
already
being
exploited
to
compromise
security
models
that
protect
company
data,
and
sensitive
data
is
at
risk
of
being
In
today’s
BYOD
world,
companies
need
to
shift
from
a
legacy
leaked
off
the
device
and
company
servers
are
at
risk
of
control-‐oriented
approach
to
a
risk
m anagement-‐oriented
being
attacked
by
mobile
devices
already
authenticated
to
approach.
Employees
should
be
given
the
freedom
to
utilize
access
company
resources.
the
device
of
their
choice,
but
at
the
same
time,
share
the
responsibility
to
ensure
corporate
data
is
secure.
It
is
with
this
in
mind
that
we
recommend
IT
implement
the
following
three
One
of
the
most
severe
examples
of
a
mobile
device
steps
for
an
effective
m obile
security
approach
within
their
vulnerability
was
DroidDream,
which
was
packaged
inside
companies:
seemingly
legitimate
applications
available
on
the
Android
Marketplace.
In
2011,
more
than
250,000
devices
were
1. Establish
full
visibility
for
all
devices
and
users
affected
by
DroidDream,
and
it
worked
by
gaining
root
connecting
to
the
company
network.
Understanding
the
access
to
Google
Android
mobile
devices
in
order
to
access
pervasiveness
of
mobile
devices
and
mobile
device
unique
identification
information
for
the
phone.
Once
diversity
within
the
organization
is
a
key
first
step
for
an
compromised,
a
DroidDream
infected
phone
could
also
effective
mobile
security
approach.
For
mobile
devices,
download
additional
malicious
programs
without
the
user’s
this
information
has
to
be
very
specific
including
name,
knowledge
as
well
as
open
the
phone
up
to
control
by
model,
manufacturer,
operating
system
type
and
version
others.
so
each
device
can
be
accurately
assessed
for
the
risk
it
presents
to
the
organization.
2. Continuously
monitor
and
assess
the
vulnerability
risk
of
Another
significant
example
was
a
vulnerability
discovered
each
device.
Mobile
vulnerabilities
are
growing
at
a
rapid
in
second
half
2010,
with
the
A pple
iOS
PDF
reader.
Within
rate.
2012
has
already
seen
4x
the
number
of
the
reader,
a
security
hole
could
be
exploited
by
a
vulnerabilities
when
compared
to
2011.
There
is
a
malformed
PDF,
allowing
an
external
party
to
take
control
corresponding
growth
in
exploits
for
these
vulnerabilities,
of
the
device.
jeopardizing
sensitive
data
on
mobile
devices.
By
continuously
monitoring
and
assessing
each
device
for
Mitigating
The
Risks
new
or
known
vulnerabilities,
it
is
possible
to
proactively
identify
devices
susceptible
to
security
risks.
As
vulnerabilities
increase
in
frequency
and
severity,
there
is
a
natural
inclination
within
IT
to
establish
rigid
rules
and
3. Focus
on
actions
that
mitigate
vulnerability
risk.
IT
policies
for
device
usage
around
data
encryption,
secure
should
start
with
defining
mobile
access
policies
for
email
and
mobile
browsing
so
that
no
data
leakage
can
employee
devices.
Policies
can
be
based
on
a
wide
variety
occur.
Unfortunately,
this
is
not
feasible
with
the
BYOD
of
criteria,
including
specific
device
attributes,
phenomenon.
Given
that
these
devices
are
personally
vulnerability
exposure,
and
employee
profile.
An
effective
owned,
employees
download
non-‐validated
applications
mobile
security
approach
relies
on
policies
that
are
easy
onto
the
device,
and
connect
frequently
via
unsecured
and
straightforward
to
communicate
and
follow.
3
IT
should
start
with
defining
mobile
access
policies
for
employee
devices.
One
of
the
simplest
ways
to
m itigate
risk
from
mobile
device
usage
is
to
ensure
each
device
has
the
latest
available
version
of
firmware.
This
eliminates
known
security
holes
but
typically
isn’t
completed
in
a
timely
fashion,
or
at
all.
An
effective
mobile
security
approach
incorporates
regular
communication
to
employees
of
how
to
update
their
devices
with
simple,
easy
to
follow
steps.
Coupling
this
with
“One
of
the
simplest
access
controls
to
limit
how
long
employee
devices
with
outdated
firmware
are
allowed
to
connect
to
company
data
is
a
powerful
step
in
ways
to
mitigate
risk
mitigating
risk
to
company
data
from
mobile
devices.
from
mobile
device
usage
is
to
ensure
Conclusion
The
data
from
the
study
confirmed
that
companies
are
exposed
to
severe
each
device
has
the
vulnerability
risk
from
mobile
devices
being
used
for
work,
and
highlighted
latest
available
that
IT
managers
are
facing
significant
challenges
identifying
and
addressing
the
increased
number
of
risks.
Historical
approaches
focused
on
control
are
no
version
of
firmware.”
longer
relevant,
and
IT
needs
to
instead
utilize
a
mobile
security
approach
that
starts
with
the
three-‐step
process
outlined
in
this
paper.
With
this
new
approach,
IT
can
effectively
mitigate
the
security
risks
arising
from
mobile
device
usage
at
their
organization,
while
employees
can
have
the
freedom
to
utilize
the
device
of
their
choice.
Rapid7
800
Boylston
Street,
th
Prudential
Tower,
29
Floor
Boston,
MA
02199-‐8095
Sales:
866.7RAPID7
(866.772.7437);
[email protected]