The National Institute of Standards and Technology recently released its guidance on the proliferation of mobile-related threats to network security. NIST’s recent guidance can be found here: http://csrc.nist.gov/publications/drafts/nistir-8144/nistir8144_draft.pdf.
As noted in the guidance, “[m]obile devices pose a unique set of threats to enterprises. Typical enterprise protections, such as isolated enterprise sandboxes and the ability to remote wipe a device, may fail to fully mitigate the security challenges associated with these complex mobile information systems. With this in mind, a set of security controls and countermeasures that address mobile threats in a holistic manner must be identified, necessitating a broader view of the entire mobile security ecosystem. This view must go beyond devices to include, as an example, the cellular networks and cloud infrastructure used to support mobile applications and native mobile services.”
The guidance goes on to “outline a catalogue of threats to mobile devices and associated mobile infrastructure to support development and implementation of mobile security capabilities, best practices, and security solutions to better protect enterprise information technology (IT).”
The guidance is intended for public and private audiences alike, and comes on the heels of the FTC’s recent acknowledgment of the NIST Cybersecurity Framework as a good place for businesses to start when thinking about cybersecurity. With the FTC’s favorable view of the NIST Cybersecurity Framework, private entities would be well served to consider other NIST guidance on cybersecurity issues, when assessing cyber risk and appropriate information security response.
Attorney Advertising. Prior results do not guarantee a similar outcome. This publication is provided as a service to clients and friends of Harter Secrest & Emery LLP. It is intended for general information purposes only and should not be considered as legal advice. The contents are neither an exhaustive discussion nor do they purport to cover all developments in the area. The reader should consult with legal counsel to determine how applicable laws relate to specific situations. ©2016 Harter Secrest & Emery LLP