Mobile file sharing inhibited by malware

Oct 07, 2014

Android Logo.jpgThe mobile movement has long passed its trend phase to become a permanent part of business operations, making it necessary for decision makers to prepare for incoming employee devices. While many vendors have created safer environments, others are subject to malware on a regular basis. As more threats target mobile hardware, it will be necessary to invest in protection to ensure safe online file sharing, mitigate file breaches and deter critical documents from being stolen.

There are numerous makes and models of mobile equipment that will need to be addressed in order to safeguard every user. While the fragmentation of the mobile ecosystem makes this effort difficult, the majority of malware is directed toward devices running one operating system: Android. The developer has 87 percent of the mobile market and 97 percent of the global mobile malware directed at its systems, according to recent report by F-Secure. While this development is significant, most of the threat comes from third party Android stores, whereas the Play Store only has malware for 1 in 1,000 apps. The problem is that Google hasn’t been able to deploy its app store and update hardware around the globe, further fragmenting the brand and making it possible for malware to be repackaged as popular programs.

“Consequently rather than laying the blame at Google’s feet, [F-Secure] stressed the real problem was fragmentation caused by hardware manufacturers failing to update their devices to the latest version of Android,” Forbes reported.

Mitigating mobile malware concerns
With the numerous malware concerns, it’s no surprise that many decision makers are hesitant to integrate mobile file sharing into their operations. In Android alone, privilege escalation has made more than 1 billion devices subject to malware and breaches, according to ZDNet. This problem is intensified by the fact that programs are often updated without asking for owner permission, enabling malicious apps to access more critical information on the device. However, this can change with an enterprise solution such as Memeo C1. This system grants IT more oversight into the location of sensitive files and enables remote wiping capabilities as well as encryption. These safety measures will ensure that no unauthorized personnel are able to view the documents and will effectively deter information from being compromised or stolen.

“Each of the new apps being installed needs to be carefully configured to set its attributes within its own sandboxes and its privileges in the system, without accidentally damaging existing apps and the user data they keep,” researchers from Indiana University wrote, according to ZDNet.

Category: Data Security