Securing 4G smartphones

By , Network World |  Security, 4G, smartphones

Because ">smartphones have typically had both limited storage and connection speeds, they traditionally haven't been as vulnerable  to some of the security threats that have long plagued PCs.

But with the advent of super-powered smartphones and 4G mobile networks, this might be changing. Today's high-end smartphones have storage capacities in the 32GB range and processing speeds that go 1GHz or higher. And once 4G technologies such as WiMAX and LTE become more widely available, smartphones will have average connection speeds of 3Gbps or higher, giving them speeds that ">approach the average U.S. wireline broadband speed.

Three things we'd like to see from the new Motorola Droid

But like all good things, this increase in speed and power comes with greater risks. Sanjay Beri, the vice president and general manager of Juniper's Access and Acceleration business unit, says that the money-stealing malware that appeared on Symbian-based phones last year is sadly a sign of things to come in the era of 4G.

"4G makes the situation more accelerated," he says. "And what will really accelerate the growth of mobile malware and spyware will be the volume of traffic that people will be able to use. Data usage will increase and there are going to be more places that will get infected."

This increased mobile data usage is only expected to intensify in the enterprise as more executives could try to use their favorite devices for both work and personal use. Mike Siegel, a senior director of product management at McAfee, says this will put a particular strain on IT departments' abilities to protect data across multiple operating systems and applications."We have senior executives now who are pushing on IT to support Android or iPhone," he says. "With iPhone and Android, you have a propagation of applications that have connections back to sensitive corporate data in the cloud. So these devices now are very much a data leakage vulnerability."

What is to be done?

Originally published on Network World |  Click here to read the original story.
Join us:






SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

Ask a Question