Organizations that do not have IT oversight managing its employees’ mobile devices unintentionally consent to making their assets vulnerable to attack from uninformed user behaviors like improper configuration and risky wireless connections (Search Consumerization). With the mobile market’s flux state adding new emerging technologies rapidly, companies have had to adjust from having their networks only accommodate few devices. Initially, laptops accessed the network through limited VPN concentrators and desktops provided access points for PDAs through synchronization. With new technologies, single devices now may encase several forms of connections: Ethernet, WiFi, Bluetooth, and 3G. Networks now accommodate off-site users through a myriad of application portals and on-site users connected through Wi-Fi accessibility and Bluetooth-enabled desktops. Each connection form provides a unique opportunity for attack. Under BYOD policies, corporations must institute a comprehensive mobile inventory that they manage device discovery. New technological circumstances create scenarios that single devices utilize several connections and individual employees possess many devices of which they may utilize concurrently.
Wireless Scanners
Wireless scanners identify which devices occupy a company’s premises with Bluetooth or Wi-Fi interface before they attempt an interaction with corporate resources. Bluetooth scanners utilize Discovery protocols to locate close devices that display their compatibility to Bluetooth services. Wireless scanners similarly detect Wi-Fi signals using “stumblers” that employ 802.11 beacons and/or probes that spot Access Points and Ad Hoc (peer-to-peer) nodes. Both methods still omit mobile devices not spending substantial time in use on site. Wireless Intrusion Prevention Systems (WIPS) accommodate for this type of usage for Wi-Fi-based connections. WLAN switches also possess “rogue detection” constantly alarming corporations of