Geekzone: technology news, blogs, forums
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Symantec recommends enterprise to manage Bluetooth devices
Posted on 9-Aug-2005 15:07 | Tags Filed under: News

Symantec New Zealand is giving IT managers and users in general some tips to make sure the Bluetooth presence in the workspace will not cause problems to businesses.

According to the Bluetooth Special Interest Group (SIG), Bluetooth weekly shipments passed the 5 million unit mark in Q2 2005, up from 3 million in Q3 2004. Most of this growth has been in the mobile phone and PDA markets. The SIG says that 20 percent of mobile phones now ship with Bluetooth wireless technology. In high-end business phones, the penetration rate is even higher, and by 2006, the majority of business-class phones will include Bluetooth.

But Bluetooth is not just for personal use in mobile phones, PDAs and laptops. More and more commercial applications are being released, such as vehicle systems for driver communications, hands-free calling and data capture. Hospitals are using wireless pulse oximeters, which reduce the likelihood of a patient accidentally removing the pulse receiver.

Several companies are implementing Bluetooth technology into their IT environments, enabling enterprise-class applications to increase productivity and improve the bottom line. Connected via Bluetooth wireless technology to the mobile phone’s data network, laptops can be truly mobile. Compared to other wireless solutions, such as 802.11, these laptops are not as constrained by local infrastructure, being able to roam to a much larger area.

Symantec is worried that now that it has gained significant deployment and is being used to power real-world business solutions, Bluetooth faces a problem common to all fast-emerging communications technologies: security.

While some risks may be due to current implementations or the protocol design, there are steps that can be taken to reduce risk. And Symantec recommends all organisations to take a proactive approach to mitigate potential security breaches.

Enterprises and mobile device users should recognise that Bluetooth comes in all shapes and sizes – security risks extend far beyond PDAs and smartphones. For example, some laptops ship with Bluetooth, potentially creating a back door into the enterprise when the laptop is connected to the LAN via Ethernet or WiFi.

CIOs and IT managers should not overlook how easy and inexpensive it is for employees to purchase accessories such as dongles in order to add Bluetooth functionality to a wide range of company-approved devices, including handsets, laptops and PDAs. These add-ons are similar to rogue access points in WiFi in the sense that they quietly create vulnerabilities in a network that appears to be secure.

Some simple steps are suggested:

  • Immediately identify any company-issued Bluetooth devices and alert users of known vulnerabilities.
  • Educate employees.
  • Strengthen company IT policies to address Bluetooth.
  • Look for products with control over Bluetooth.
  • Consider tools for identifying and mitigating security risks.

    IT managers can scan their networks for attached devices, including PDAs. They can also remotely disable Bluetooth in company devices. And enterprises should treat unauthorised Bluetooth PDAs, handsets and accessories like rogue access points: if employees understand the risks and vulnerabilities associated with Bluetooth usage, then they must accept accountability for opening back doors into the enterprise with unauthorised devices.

  • comments powered by Disqus

    Trending now »

    Hot discussions in our forums right now:

    Kiwis to be hit with tax on online purchases
    Created by Gordy7, last reply by Benjip on 22-Nov-2017 09:51 (178 replies)
    Pages... 10 11 12

    Argh! Bloody Windows10 update just cost me another morning!
    Created by kryptonjohn, last reply by Lias on 22-Nov-2017 19:28 (21 replies)
    Pages... 2

    Slow Speed's Over Cat 5 UTP?
    Created by TimmyJackson, last reply by Talkiet on 22-Nov-2017 18:59 (21 replies)
    Pages... 2

    Xero generated PDF's faulty ?
    Created by xpd, last reply by MadEngineer on 20-Nov-2017 20:18 (15 replies)

    MMS woes
    Created by peejayw, last reply by peejayw on 22-Nov-2017 17:59 (12 replies)

    Phone scammers know our name.... how?
    Created by kiwifidget, last reply by WyleECoyoteNZ on 21-Nov-2017 20:46 (11 replies)

    Device choice - tablet, chromebook, other
    Created by Geektastic, last reply by Geektastic on 22-Nov-2017 15:39 (20 replies)
    Pages... 2

    Using indoor UHF aerial for Freeview in Auckland
    Created by henareho, last reply by Spyware on 22-Nov-2017 14:58 (9 replies)