Access to Public Web/E-mail: Vulnerability #1
Over 90 percent of business executives who responded to Bluefire’s survey are using their device for email, either for a web-based account or for a corporate server-based account. An attack can be anything from a hacker at Starbucks who is accessing the data on someone else’s device, to someone using Bluetooth to steal personal information from another person’s handheld. “Trojans” can be defined by something posing as something other than itself. For example, a “Trojan” can be an application that can open a port that should not be opened, allowing outsiders access to the device. Firewalls set rules for the device that designate which ports are allowing traffic into the device. A firewall can keep certain attacks out by blocking the ports that would allow those viruses in. Using Bluetooth requires the devices to be within 30 feet of each other while IR control requires the devices to point at each other from closer than 30 feet.
Some mobile security software controls can be used to keep wireless connections turned off. While most device owners are not using IPSec VPNs for personal communications, they should at least insist on secure web-based connections using SSL encrypted communications. Integrity Manager is an application that monitors the settings on each device and will quarantine the device if the settings change. Anti-virus with automatic updates also keeps your smartphone protected by providing an up to date list of all known viruses from which the software can scrub emails and attachments, just like on your notebook or desktop.
Access to Corporate Email, Networks, Databases: Vulnerability #2
Smartphones and wireless devices are often used to gain access to the enterprise server for e-mail, shared files, and shared databases. Yet as with other wireless networking options, this also leaves the device open to attacks, viruses, or “Trojans”, and ultimately makes the network vulnerable as an unsecured device connecting to a secure server makes that connection unsecured.
Mobile Security Solution: Vulnerability #3
Mobile security features for protecting lost or stolen devices. Bluefire has seen an increasing number of government and enterprise customers requesting that Bluetooth and IR be temporarily or permanently blocked from use. If a device is lost or stolen, the private information becomes open and accessible.
http://www.blackberrytoday.com/articles/2006/6/2006-6-1-Mobile-Device-Security.html