Insulating endpoints from attacks

These devices are constantly at the risk of malicious attacks by hackers

June 27, 2010 12:36 am | Updated December 04, 2021 10:52 pm IST - HYDERABAD:

The evolution of smart phones into being the next major computing platform has employees using them more like PCs than a phone.

The evolution of smart phones into being the next major computing platform has employees using them more like PCs than a phone.

Addressing virtual attacks and keeping their computers and mobile devices protected is one of the major concerns of Indian companies today.

Until a few years ago, a majority of computers were wired to the corporate network, but now, with the entry of laptops and smart devices, the scene is different. These wireless devices, technically known as ‘endpoints,' are constantly at the risk of malicious attacks by hackers.

According to a recent study by the International Data Corporation, the number of endpoints will reach one billion by 2011, with the Asia Pacific region accounting for a majority.

Traditionally, the protection of these endpoints was limited to installing anti-virus, anti-spyware, desktop firewall, intrusion prevention and device control technology. However, with corporate boundaries melting, the increasing number of Indians working on the move has made the traditional approach to securing data insufficient.

“The recently released Symantec 2010 Enterprise Security Report on Millennial Mobile Workforce and Data Loss showed that employees are using their own personal devices for corporate purposes, either at workplace or while working remotely,” says Vishal Dhupar, MD, Symantec, India.

“Moreover, 59 per cent of Indian enterprises feel employee-owned endpoints compromise on security. Also, with mobile devices becoming more sophisticated, they provide greater access and store more data and become a higher target for theft,” he says.

The evolution of smart phones into being the next major computing platform has employees using them more like PCs than a phone. However, smart phones too are prone to malicious attacks and instances of ‘Bluejacking' and ‘Bluesnarfing,' which involve sending malicious data through Bluetooth and copying contents of mobile device, are also on the rise.

According to Symantec's report, organisations expressed concerns at the vulnerability of employee-owned mobile devices. The risk of smart phones being attacked was 62 per cent, followed by Windows-based laptops at 55 per cent, PDAs at 44 per cent and Mac-based laptops at 33 per cent.

“Smart phones are usually attacked by hackers through Bluetooth and MMS. They can also be affected by emails, instant messaging, Wi-Fi and Internet downloads. Another notable threat is from snoopware which compromises the device's functionality by disabling applications or sending text messages without the user's knowledge,” Mr. Dhupar says.

According to industry reports, more than 43 million Indians used mobile banking facilities for making and checking transactions, and as more people use such facilities, the financial incentives for virus writers and mobile hackers too increase.

New software

“Companies should go a step ahead from the conventional methods of countermeasures such as firewalls, anti-virus and intrusion detection and prevention. We have also worked on these issues and come up with software such as Symantec Endpoint Protection Mobile Edition 6.0 and Symantec Mobile Management 7.0,” he says.

Companies should also make sure that their software is up-to-date, adopt a password policy, keep security product subscription updated and finally, have a comprehensive heuristic file protection, intrusion prevention system and behavioural monitoring.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.