Bring Your Own Trojan Horse: get ready to ‘muck out’

27 March 2015
3 minute read
ITAM News & Analysis

Bring Your Own Trojan Horse: get ready to ‘muck out’

27 March 2015
3 minute read

A new promotional report entitled ‘The BYOD Trojan Horse: Dangerous Mobile App Behaviours & Back-door Security Risks’ suggests that that enterprises are not doing enough to understand which mobile app behaviour(s) hitting their data networks are the most risky.

no-horse-shit4r

Beware back-door security risks

Spin or substance? 

Contrived and jointly prepared by Flexera Software and IDC, the spin here is designed to warn us that firms are not testing apps for these risky behaviour types to ensure proper enforcement of BYOD policies.

No philanthropy, this is business

Flexera isn’t running these reports out of pure philanthropy, the firm sells software licensing, compliance and installation solutions – hence the ‘loaded’ nature of the topics presented herein.

Despite data security being among the biggest challenges when implementing BYOD policies for enterprises (71 per cent), 61 percent have not even identified which app behaviours they deem risky.

The report “underscores” that BYOD risk doesn’t just arise from malicious hackers and rogue nations.

Flashlight flames!

Threats to data and security are hidden, as in a Trojan horse, in the most innocuous-seeming apps that employees can unwittingly unleash on the enterprise, like a flashlight app that illegally transmits user data to advertisers, or common banking apps capable of capturing device logs, accessing contacts lists, reading SMS messages or even installing packages on the phone.

Among the report’s subsections:

  • Enterprises are broadly adopting BYOD policies: 48 percent of enterprises have already or are in the process of implementing BYOD policies, and another 23 percent plan on doing so within two years.
  • Blocking risky apps is a priority: 47 percent of respondents say they’re instituting policies that block risky app behaviours to mitigate mobile app security risks. Another 22 percent plan on doing so within two years.
  • Enterprises are failing to identify apps they deem risky: A majority of organisations – 55 percent – have not identified specific mobile apps that exhibit risky behaviours that would violate their BYOD policies.

“BYOD policies are critical to organisations seeking to maximise the value and minimise the risks they encounter by integrating mobile devices and apps within their infrastructures, because these policies define the behaviours that are and are not acceptable,” said Robert Young, research manager, end point device & IT service management and client virtualisation software, IDC. “But BYOD policies are inadequate if appropriate enforcement mechanisms are not put into place and followed.”

BYOD policies are not reducing enterprises’ security risks

Only 16 percent of respondents report that their BYOD policies are resulting in lower enterprise application risk.

“Most organisations already have strong processes to test and remediate traditional desktop, virtualised and cloud based applications to make sure they’re safe and reliable. But as the report indicates, enterprises have not extended these Application Readiness best practices to mobile apps,” said Maureen Polte, VP of product management at Flexera Software. “These same processes can and should be extended to mobile apps to ensure that risky app behaviours and apps are identified and appropriate measures are taken to contain those risks.”

Report Download Here (Registration Required) 

Image credit

Can’t find what you’re looking for?