An ethical hacker's view on mobile malware and how to stop it

10.04.2012

• Installing antivirus software as standard.

• Looking for, and deploying, tools that can manage mobile devices in much the same way as traditional PCs.

• Thinking about capabilities to avoid data leakages resulting from device loss or left, and perhaps a solution that can remotely locate and destroy AWOL devices.

• Where possible, restricting and controlling what can and can't be done on the phones.

• If you can't stop it then create and communicate security policies that govern what data can, and can't, be accessed and stored. It is also essential that users understand why this is so important