Security of Mobile Communications Devices
Vol. 4, Issue 6
All this functionality in one device!
Mobile communication devices (Blackberries, iPhones and smart phones in general) have become indispensable tools for today's highly mobile society. Small and relatively inexpensive, these multifunction devices can be used not only for voice calls but also text messages, email, Internet access along with stand alone applications similar to those performed on a desktop computer. A significant amount of personal, private and/or sensitive information may accumulate or be accessed via these devices. Additionally, some of these devices may allow you to access your home computer or your corporate network.
What risks do they present?
While the devices offer many benefits and conveniences, they also pose risks to you and/or your organization's security. As these devices continue to take on the characteristics of personal computers, they also inherit the same potential risks. Some of the primary risks include the following:
- The portability of the device leads to a higher likelihood of loss of the device. Millions of mobile communication devices are lost each year.
- When Bluetooth and/or wireless (not cellular) communications are enabled, these devices are subject to the risk of eavesdropping and "highjacking".
- "Malware" exists and, if installed on your device, can allow a perpetrator remote access to your device to listen and record all of your calls, send text messages to the perpetrator whenever you make or receive a call, read all of your messages, make calls on your behalf from your phone, access all of the information on your phone, trace your location and enable the speaker functionally on the phone to listen in on conversations even when the phone is not in use.
- Sites purporting to offer "free games or ring tones" are major vectors for distributing malware.
- While the reports of worms and viruses impacting these devices are relatively low, this is expected to increase in the future.
Despite the risks outlined above, many users do not understand how vulnerable their mobile device is or how to deploy important security settings and controls.
What can I do to secure my mobile communication device?
The following outlines steps you can take to protect your mobile communication device. Some of the steps are dependent upon the functionality of your device.
- Use a password to access your device. If the device is used for work purposes, you should follow the password policy issued by your organization.
- If the Bluetooth functionality is not used, check to be sure this setting is disabled. Some devices have Bluetooth-enabled by default. If the Bluetooth functionality is used, be sure to change the default password for connecting to a Bluetooth enabled device.
- Do not open attachments from untrusted sources. Similar to the risk when using your desktop, you risk being exposed to malware when opening unexpected attachments.
- Do not follow links to untrusted sources, especially from unsolicited email or text messages. Again, as with your desktop, you risk being infected with malware.
- If your device is lost, report it immediately to your carrier or organization. Some devices allow the data to be erased remotely.
- Review the security setting on your device to ensure appropriate protection. Be sure to encrypt data transmissions whenever possible.
- Enable storage encryption. This will help protect the data stored on your device in the event it is lost or stolen, assuming you have it password protected.
- Beware of downloading any software to your device. If the device is used for work, follow your organization's policy on downloading software.
- Before disposing of the device be sure to wipe all data from it and/or or follow your organization's policy for disposing of computer equipment.
For more information on securing mobile communication devices, please visit:
The information provided in the monthly Security Tips newsletters is intended to increase the security awareness of an organization's end users and to help them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, the increased awareness is intended to help improve the organization's overall information security posture.
These tips are brought to you in the Commonwealth of Virginia by the
Virginia Information Technologies Agency
in coordination with: