The Advent of Mobility Risk

james-rundle
There's a lot of talk around mobile security, but how much of it is hype?

Every month it seems there is another story of a hapless civil servant leaving a dossier of sensitive information on a tube, train, bus, or bench. Take Richard Jackson, for instance, who escaped jail time but was fined £2,500 ($4,000) for leaving a bright orange envelope on a Surrey, UK-bound train in 2008, which contained operational information on al-Qaeda. More recently, a London police officer mislaid sensitive information about potential targets for terrorism in the upcoming summer Olympics, which reportedly also contained the names and numbers of an elite police unit's personnel.

Events like these frequently arise in discussions with industry participants about the future applications of mobile technology. What if, one compliance officer in Canary Wharf asked, one of his portfolio managers left their iPad on a train? If the device was capable of executing trades, the consequences could be disastrous. If it fell into the hands of a direct competitor, it could be even worse, given the information stored on it. Similar concerns have been voiced by sources at banks, vendors and more.

Overwrought?
But how disastrous would the loss of a mobile device really be? Anyone with malicious intentions who came across such a device would have to overcome what would presumably be several lines of defense.

First, sensitive information would surely be protected by weapons-grade encryption. I’m not aware of apps containing sensitive information or executable functions that can simply be downloaded from an app store, installed, and then immediately ready to go. Some could even have biometric protections in place.

Second, as mentioned earlier, a misplaced device would likely have limited or no execution capability. We’re nowhere near traders being able to input transactions and execute them at, say, Heathrow airport’s Terminal 5. It's just not likely to happen. However, monitoring exposures, positions, risk, market data and other areas is a distinct possibility, particularly if an active trader is called away to travel in an emergency, for instance.

We’re nowhere near traders being able to input transactions and execute them at, say, Heathrow airport’s Terminal 5. It's just not likely to happen.

Third, it’s as easy as the push of a button at a computer to remotely wipe all data from an iPhone. And this functionality is available to all consumers, not just, say, tier-one investment banks.

Even if an enterprising thief is able to overcome all these obstacles, it’s unlikely they’d know what to do once they gained access. A Bloomberg terminal, after all, isn't the most accessible piece of technology ever created; it requires a certain level of knowledge and expertise to take adequate advantage of its functionality. And the Bloomberg Anywhere mobile app, for example, requires an existing login for a physical Bloomberg Professional terminal.

The Inevitability of Mobility
The way in which the world operates is changing. Mobility is happening, and it is making its way into financial services. It's an expected part of working lifestyles, but of course, it has to be accomplished in a sensible fashion. It offers a great deal of benefit for those who would like to have a glance at the state of their portfolios on the fly, but has promising applications for client relationship management (CRM) as well. An inevitable part of this will be the birth of mobility risk, but it can't be allowed to become a cancerous aspect of operational strategy, where paranoia overrides common sense.

Mobile security will be discussed in great detail during a webcast on March 28, at 10 a.m. EST/3 p.m. GMT. There is a great panel of speakers lined up, and it's sure to be an exciting conversation.

In the meantime, to share your thoughts on these issues, contact me on +44 207 316 9811 or james.rundle@incisivemedia.com.

 

Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.

To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe

You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.

If M&A picks up, who’s on the auction block?

Waters Wrap: With projections that mergers and acquisitions are geared to pick back up in 2025, Anthony reads the tea leaves of 25 of this year’s deals to predict which vendors might be most valuable.

Removal of Chevron spells t-r-o-u-b-l-e for the C-A-T

Citadel Securities and the American Securities Association are suing the SEC to limit the Consolidated Audit Trail, and their case may be aided by the removal of a key piece of the agency’s legislative power earlier this year.

Enough with the ‘Bloomberg Killers’ already

Waters Wrap: Anthony interviews LSEG’s Dean Berry about the Workspace platform, and provides his own thoughts on how that platform and the Terminal have been portrayed over the last few months.

Most read articles loading...

You need to sign in to use this feature. If you don’t have a WatersTechnology account, please register for a trial.

Sign in
You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Sign in.

Alternatively you can request an individual account here