The Hindu : Sci-Tech / Technology : Insulating endpoints from attacks TECHNOLOGY HYDERABAD, June 27, 2010
ABHIJIT DEV KUMAR SHARE · COMMENT · PRINT · T+ The evolution of smart phones into being the next major computing platform has employees using them more like PCs than a phone. The HinduThe evolution of smart phones into being the next major computing platform has employees using them more like PCs than a phone. These devices are constantly at the risk of malicious attacks by hackers Addressing virtual attacks and keeping their computers and mobile devices protected is one of the major concerns of Indian companies today. Until a few years ago, a majority of computers were wired to the corporate network, but now, with the entry of laptops and smart devices, the scene is different. These wireless devices, technically known as 'endpoints,' are constantly at the risk of malicious attacks by hackers. According to a recent study by the International Data Corporation, the number of endpoints will reach one billion by 2011, with the Asia Pacific region accounting for a majority. Traditionally, the protection of these endpoints was limited to installing anti-virus, anti-spyware, desktop firewall, intrusion prevention and device control technology. However, with corporate boundaries melting, the increasing number of Indians working on the move has made the traditional approach to securing data insufficient. "The recently released Symantec 2010 Enterprise Security Report on Millennial Mobile Workforce and Data Loss showed that employees are using their own personal devices for corporate purposes, either at workplace or while working remotely," says Vishal Dhupar, MD, Symantec, India. "Moreover, 59 per cent of Indian enterprises feel employee-owned endpoints compromise on security. Also, with mobile devices becoming more sophisticated, they provide greater access and store more data and become a higher target for theft," he says. The evolution of smart phones into being the next major computing platform has employees using them more like PCs than a phone. However, smart phones too are prone to malicious attacks and instances of 'Bluejacking' and 'Bluesnarfing,' which involve sending malicious data through Bluetooth and copying contents of mobile device, are also on the rise. According to Symantec's report, organisations expressed concerns at the vulnerability of employee-owned mobile devices. The risk of smart phones being attacked was 62 per cent, followed by Windows-based laptops at 55 per cent, PDAs at 44 per cent and Mac-based laptops at 33 per cent. "Smart phones are usually attacked by hackers through Bluetooth and MMS. They can also be affected by emails, instant messaging, Wi-Fi and Internet downloads. Another notable threat is from snoopware which compromises the device's functionality by disabling applications or sending text messages without the user's knowledge," Mr. Dhupar says. According to industry reports, more than 43 million Indians used mobile banking facilities for making and checking transactions, and as more people use such facilities, the financial incentives for virus writers and mobile hackers too increase. New software "Companies should go a step ahead from the conventional methods of countermeasures such as firewalls, anti-virus and intrusion detection and prevention. We have also worked on these issues and come up with software such as Symantec Endpoint Protection Mobile Edition 6.0 and Symantec Mobile Management 7.0," he says. Companies should also make sure that their software is up-to-date, adopt a password policy, keep security product subscription updated and finally, have a comprehensive heuristic file protection, intrusion prevention system and behavioural monitoring. Comments to : web.thehi...@thehindu.co.in Voice your thoughts in the blog to discuss the Rights of persons with disability bill at: http://www.accessindia.org.in/harish/blog.htm To unsubscribe send a message to accessindia-requ...@accessindia.org.in with the subject unsubscribe. To change your subscription to digest mode or make any other changes, please visit the list home page at http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in