Mobile device security

Mobile devices have become a standard piece of office equipment. Used frequently for temporary storage and accessing large amounts of confidential information in internal systems, it is no longer a question whether they are used but whether they are used securely.

During recent years, mobile devices have developed at a breathtaking pace, and are now as powerful as the workstations of just a few years ago. Mobile devices – tablets or smartphones – provide extensive information accessing and processing capabilities and allow users to communicate effortlessly, establish remote connections and work on the go.

There is no doubt that such flexibility is extremely useful, but it is vital to consider the terms with which these devices should be introduced and used in your office. In many cases, the gains of allowing mobile access to certain information or function must be weighed against the degree of information and system threat exposure.

We have completed numerous assignments related to mobile device security, such as:

  • remote management and device profile configuration
  • security instructions and terms of accessing classified information with mobile devices
  • assessments of acceptable use policies and suggestions for improvement (either for the organisation’s mobile device policy or the entire life cycle)
  • connection monitoring and protocol testing
  • mobile application security audit

We assess and provide recommendations regarding what can be stored in mobile devices, devices’ suitability for storage, which mobile security methods to use and the terms of storage.

MirrorLink

One rising area of mobile device security is with connected cars. MirrorLink is a leading connectivity standard for connecting smartphones and in-car infotainment systems, and using smartphone apps on car media device screen in a safe way. Mirrorlink is promoted by Car Connectivity Consortium.
 
A key feature of Mirrorlink specification is information security: It specifies an authentication method for connecting only trusted smartphones with in-car systems. Nixu does MirrorLink security audits - so called MirrorLink Device Attestation Protocol (DAP) Audits, including DAP Client, Server and Manufacturer audits. Nixu has experience on DAP audits with several in-car infotainment systems and smartphone manufacturers. Nixu performs also other extensive Connected Cars related security audits and penetration testing.
Do not forget mobile devices

Mobile device attacks are becoming increasingly common. Make sure that the weakest link is not in your pocket.

Support mobile work – securely

Configure mobile systems for convenient but safe and secure use.

Identify your mobile threats

Learn to use mobile devices correctly and make sure you are prepared to take the necessary steps to secure them.

Information security awareness

Improve your information security efficiently by promoting information security awareness.
Read more

Business Continuity & Risk Management

Tools for operational risk and overall risk management.
Read more

Secure Software Development & Procurement

Ensure software security already during the development stage.
Read more