CIS issues free benchmark on iPhone security
Set of recommendations is designed to reduce attacks, help in erasing data
Computerworld - The nonprofit Center for Internet Security today released what it termed the industry's only consensus security benchmark for the iPhone, which is aimed at helping IT managers and users reduce the risk of data stored on the device from being compromised.
The benchmark is free with a required registration at the CIS Web site.
The document takes users through more than 20 simple recommendations for system settings, Safari settings and iPhone Configuration Utility settings, a spokeswoman said. Using the recommendations is designed to help reduce the the chance of a remote attack, with instructions on securely erasing data and setting up strong passwords.
A separate benchmark for multi-function device security provides configuration and deployment guidance for business printers, copiers, scanners and fax machines.
The iPhone benchmark applies to iPhone OS version 2.2.1 and the iPhone Configuratioin Utility version 1.1.043, CIS said.
Blake Frantz, chief technology officer at CIS, said the iPhone presents "security challenges" for enterprises. Some large businesses, such as Kraft Foods and Oracle Corp., have adopted the iPhone for workers on a large scale, although there have been some holdouts in the financial sector, including Bank of America, over security concerns.
Over the past year, CIS has had more than 1 million downloads of its benchmarks, which it develops according to a wide range of standards and with input from 150 members in corporations, government, universities and security organizations, the CIS Web site said.
Read more about Macintosh in Computerworld's Macintosh Topic Center.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Macintosh White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!