5 Takeaways from the Symantec Smartphone Honeystick Project

Published On: September 29, 2015Categories: Uncategorized

n

Most of us know not to click on questionable links or enter personal information on sketchy-looking websites. But people can be remarkably cavalier about phone security, and phones are easier to lose than laptops. Data security on smartphones is every bit as important as that on machines used in a desktop environment – potentially more so, since there's no telling who might find a phone in a dressing room, food court, or backseat of a cab.

n

n

In 2012, Symantec carried out the Smartphone Honeystick Project, in which they loaded up

n

n

n

50 phones with simulated personal and corporate data, and then "lost" them in five cities. The phones were outfitted with remote monitoring capability so Symantec could see what happened to them. All but two of the devices were found, and not even half the finders attempted to locate an owner. Here are 5 key takeaways from the Symantec Smartphone Honeystick Project and what they mean for phone security. It's worth noting that all of these also apply if you deliberately stop using a phone, in order to upgrade, for example.nnn1. Finders Go for the Good Stuff Right AwaynnnOn found phones, nearly half of finders accessed a fake "remote admin" application, and 45% of found devices logged attempts to read corporate email. More than half of phones' "saved passwords" files were accessed, and on over 60% of the phones, access to social networking and personal email were attempted. Two-thirds of finders attempted to click through login or password reset screens (in which username and password fields were pre-filled with bogus information). Bottom line: if someone finds your phone, they'll go through it.nnn2. Even Those Who Tried to Return the Phone Tried to Access Data FirstnnnAlthough only just under half of finders attempted to locate a phone's owner, even these people tried to look at the data on them. Naturally, someone attempting to find an owner will access certain phone functions to try to learn who a phone belongs to, but generally these finders were more curious than strictly necessary. Sixty percent tried to view social media and email information, and 80% tried to access corporate information with enticing filenames like "HR Salaries" and "HR Cases."nnn3. Everyone Should Take Two Steps to Increase Phone SecuritynnnA Federal Reserve survey from 2014 found that 51% of smartphone users use mobile banking, and 24% make mobile payments. Password protection can go a long way toward improving data security on your phone. This prevents the casual finder from perusing your data. Setting up the ability to remotely wipe data from a lost device can also increase phone security. That way, even if your phone is found by a determined person who managed to get by your password, there would be no data on the device for them to find.nnn4. Businesses Need a Data Security Plan for Lost or Stolen Phones

n

n

Every business that issues phones or has a Bring Your Own Device (BYOD) policy should have a comprehensive plan for when phones are lost or stolen, including:nnn• Requiring password-enabled screen locksnn• Educating employees about mobile device risksnn• Inventorying mobile devices connected to the company networknn• Having a set process everyone follows if a device is lost or stolennn• Making mobile device security an integral part of overall corporate securitynnn5. If You Use Two-Factor Authentication and Lose Your PhonennnMore people are using two-factor authentication that requires use of a phone to access accounts or applications, and this is good, but what if the phone you use for two-factor authentication is lost or stolen? The best cure is prevention in the form of taking backup options offered by the accounts or apps. With Google apps, for example, you can have access codes sent to backup phones, use a one-time printable backup code to sign in, or sign in from a trusted computer and turn off two-factor verification until you can get verification codes again. Two-factor authentication is good, but you have to give yourself backup options in case you lose your phone.nnnConclusionnnnSmartphones are heavily integrated into our everyday and work lives, and in some ways, they contain more valuable information than our wallets do, like links to financial services or sensitive corporate data. The Symantec Smartphone Honeystick Project makes it clear that people try to access data on smartphones they find, whether or not they attempt to locate the owner.nnnUsing screen password protection, enabling remote data wiping capability, and having corporate policies covering mobile data security are essential to protecting what's on our smartphones. The very idea of phone security may seem odd to those who didn't grow up with mobile devices, but it's something that must be taken seriously if we're to have robust data security.

n

n

Leave A Comment