Mobile App Security: Securing your mobile phone in the BYOD era is not an easy matter. However, you can start by taking into account the four steps that we outline below. In the era of technological development of mobile συσκευών, καθώς και η εμφάνιση όλο και περισσότερων mobile apps που διευκολύνουν τους χρήστες, το ζήτημα της ασφάλειας του κινητού τηλεφώνου δεν είναι απλό, και σίγουρα ούτε και εύκολη υπόθεση.
The dangers are lurking and a burning question is torturing all users: are mobile apps safe and protected from malicious hackers?
Νέα δεδομένα αποδεικνύουν πως δεν έχει και πολύς χώρος για βελτιώσεις. Τα ποσοστά της έρευνας του study of 640 businesses by the Ponemon Institute for IBM είναι ανησυχητικά: Η μέση επιχείρηση ελέγχει λιγότερο από το μισό των apps για θέματα security before they are distributed to the market. This omission can irreparably expose their users' data and makes them vulnerable to potential cyber attacks.
Have many companies adopted the bring-your-own device (BYOD) tactic? 55% allow employees to use and download professional apps to their personal devices, according to a Ponemon survey. Even more worrying is the fact that about 67% of the companies surveyed allow their employees to download non-vetted apps to their professional devices.
So how can we protect ourselves in the age of BYOD? A good start is the four simple steps:
Issue # 1: Create Secure Apps
Mobile malware exploits vulnerabilities or bugs in the code of mobile apps. Using more secure mobile app development practices, including the use of source code scanning tools, can help mobile apps withstand such attacks. It is also important to analyze the code from third parties, or from any app that is allowed to coexist on the phones used by employees. In this case the executables must be scanned.
Issue #2: Protect your device
Η ασφάλεια ενός app είναι ένα θέμα που συνδέεται άμεσα με την ασφάλεια της συσκευής στην οποία εγκαθίσταται. Μια απροστάτευτη συσκευή η οποία έχει γίνει modified από τον κάτοχό της ή από ένα unauthorized app για να προσπεράσει το οperating system security, μπορεί να δεχθεί την εγκατάσταση οποιουδήποτε app από οποιαδήποτε πηγή. Αυτές οι συσκευές γνωστές ως jailbroken ή rooted devices, are highly susceptible to mobile malware.
The worst however is that mobile malware attackers are not relying exclusively on jailbroken devices to achieve their goals. Even users who make excessive use of licenses in mobile applications - often by default - can also leave a path open for malware, such as basic services, simple SMS.
Issue #3: Prevent the theft / leakage of data
When mobile apps have access to data, both personally and privately, documents are usually stored on the device itself. If the device is lost, or data is shared with unauthorized apps, there is a high risk of theft or leakage of this data.
Issue #4: Exclude high-risk access
Mobiles are designed to interact with backend services. For example, mobile banking apps allow users to transfer money to third parties, while mobile CRM apps allow salespeople to update their forecasts and access critical account data.
Using context and risk factors (for example, if the device is compromised or location/time is suspicious), it is possible to prevent or block access to your systems.