Smart phone applications could pose a significant threat to your company’s IT system in terms of security, availability or mobile data costs if left unchecked.
In a worst-case scenario, valuable and sensitive data could be at risk if you allow employees to download and install apps at will to their personal and work devices.
While smart phone settings can vary from device to device, all potentially leave a company open to abuse. Every time you install an app, it's important to check what resources and data the app is requesting permission to use.
At some point, everyone has skipped through lengthy terms and conditions to save time. It's these terms and conditions which often explain what data the app will use and how it will use it - so not reading them could mean unwittingly giving an app control over sensitive data, or even the phone itself.
Although an app may appear to be a harmless game or a useful productivity tool, there is nothing to stop it from including code to send a text message, make a phone call or even read data stored on the phone and upload it to an external server.
To minimise these risks, your business and its employees should consider some simple steps:
How sure can you be that a company promoting an app has not included hidden features or a developer has not included some malicious code? Software vendors with a track record of delivering solutions to businesses generally have the development disciplines in place to protect you from these risks, so beware the unproven startup or one man band developer.
Smart phone apps are extremely attractive, but it’s important not to forget that under the veneer of simplicity, IT is extremely complex. Your systems can be manipulated by people who understand that complexity, if they are left unchecked.
Paul Ridden is Managing Director of Skillweb, a privately owned, UK based business that provides technology solutions designed to help organisations manage their mobile workforces and track the movement of their goods.
Comments
The mobile ecosystem presents developers with both challenges and opportunities. Before getting into the nuts and bolts of data security, consider the landscape:
Make someone responsible for security.
Take stock of the data you collect and retain.
Understand differences between mobile platforms.
Don’t rely on a platform alone to protect your users.
Generate credentials securely.
Use transit encryption for usernames, passwords, and other important data.
Protect your servers, too.
Don’t store passwords in plain text.
You’re not done once you release your app. Stay aware and communicate with your users.
Add a comment