Analysis: Five security tips for smartphones in the enterprise
The technology of today’s smartphones is going to put more pressure on IT departments, and IBM has released advice about how administrators can cope.

Amongst all the fanfare from the release of the 3G iPhone, business users were particularly interested in the fact that it was much better positioned to be used for enterprise, thanks to new business tools and capabilities such as the push email.
This has focused more attention on the incorporation of smartphones into business networks, which in the future looks to be a necessity thanks to modern day workers needing to perform many tasks on the move.
RIM's Blackberry has been the business smartphone of choice for a while, with its ability to perform corporate tasks and its functionality.
However, a new generation of smartphones such as the iPhone but also devices like the Nokia N71 and the new series of Blackberrys are capable of doing much more. These phones have features such as the ability to access the net using 3G, watching videos and downloading third party applications which have its own inherent risks.
It is also clear that smartphones will carry more important and confidential corporate information than ever before such as internal communications, customer contacts, financial information as well as intranet systems and networks.
In the wrong hands it could cause huge damage to business, and IT departments around the world are going to have to deal with new problems and a bigger strain on networks.
In response, IBM Internet Security Systems released a five point plan which IT administrators need to keep in mind when attempting to incorporate the technology into their enterprises.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
1 - Enforce strong password policies
If the smartphone was lost or stolen, strong passwords could mean the difference between the loss of a phone and the loss of sensitive data which could cost business financially and destroy reputations. It was advised that business smartphones needed to be configured to lock screens after a period of inactivity, and passwords be complicated and changed on regular basis.
2 - Protect smartphone VPN access
Attackers are capable of exploiting vulnerabilities in smartphones and infecting them with malware, which in turn can transfer through VPN connections through to intranet resources. IBM said that smartphone servers and VPN egress points should be placed on a network which is firewalled from the rest of the internet. Connections coming from the phones should be monitored with intrusion protection systems and access from smartphone VPNs restricted to servers that are really needed by users.
3 - Establish procedures for employees to follow
It is possible for sensitive data to be wiped from smartphones remotely from the enterprise server if they are lost or stolen. It was recommended that a contact point for employees who had lost their phone so data could be wiped and a replacement be sent.
4 - Control the installation of third-party applications
Smartphone users will be tempted in downloading productivity applications or other files which carry malware or a back door. Businesses needed to consider restrictions on these types of third party applications, especially if they are not digitally signed.
5 - Evaluate smartphone anti-virus solutions
Although there are few malware threats on smartphones at the moment, there are anti-virus solutions on offer. As the popularity of smartphones increase, so will the malware that targets them. Businesses needed to monitor constantly in determining which mobile phones needed to be included in host based security deployments.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd
-
RIM unleashes PlayBook OS 2.0
News PlayBook OS 2.0 comes with plenty of shiny features, but is it too late to save the tablet?
By Tom Brewster
-
Cisco posts bumper results amidst restructure
News The networking giant impresses analysts with solid profit and record revenue.
By Tom Brewster
-
Cisco announces 40GbE and 100GbE switching upgrades
News The networking giant looks to support companies in dealing with the data boom, bashing competitor Juniper along the way.
By Tom Brewster
-
Cisco launches turbo-powered wireless access point
News The networking giant tries to cater for the BYOD trend with its new Aironet 3600 Series AP.
By Tom Brewster
-
Q&A: All about BlackBerry Mobile Fusion
In-depth We spoke to Tim Hodkinson, RIM's director of enterprise marketing for Europe, the Middle East and Africa (EMEA) about the company's latest announcement and what it means for businesses.
By Maggie Holland
-
Cisco back on track?
News The networking giant predicts revenue and earnings above estimates, as the company looks to get back on the right path after some turbulent times.
By Nicola Leske
-
Touch and go
In-depth NFC is already making its presence felt for payments. But could it have wider business uses, asks Paul Briden?
By Paul Briden
-
Playbook to sync with Office 365
News RIM’s tablet device delves deeper into the corporate market with the inclusion of Microsoft’s upcoming cloud suite.
By Jennifer Scott