In the previous section, we briefly mentioned mobile devices; however, the use of mobile devices in the workplace is growing and is deserving of more detailed consideration. Mobile devices are part of our lives. Smartphones are the obvious example; however, there are other devices, including smartwatches and tablets. Many people use these devices as an integral part of their daily lives, and they bring them to work. How do you address this on an organizational network? Many questions arise, beginning with whether to allow personal devices to connect.
In most organizations. it is simply impractical to forbid personal devices. Some highly secure defense-related organizations can do this, but for most companies, you will simply have to accept that your employees are likely to be carrying personal devices. These devices pose substantial security risks. They present an entirely new attack vector. These issues must be addressed.
The first issue is defining how these devices can be integrated into the organization. Some established terms accomplish this:
There are several approaches that can further mitigate security risks, regardless of the approach implemented. The first is Network Access Control (NAC). NAC functions by scanning a device when it first connects. This scan looks to see if the device meets minimum security requirements and has no obvious malware on it. This can be done in either an agentless or agent manner. The agent approach installs a small software agent on the device in order to scan. This is far more effective, but some people object to the agent being installed.
Another approach is to allow devices to connect to only a guest network, not the corporate network. In this way, the employee still can use the networked device, but it poses far less of a threat to the organization’s network. There is still a threat, but no more than from any guest accessing the guest network.
When it comes to mobile devices, one solution doesn’t fit all. With mobile devices being so ubiquitous, network security professionals must address them. As with any security issue, an objective threat assessment must be conducted, risks analyzed, and only then can appropriate policies be implemented and enforced.