Pokémon Go!... Or Not
How the Pokémon Go Game Can Distrupt Your Company's Network Security
So, last week I’m walking around the city with my kids, when they suddenly start getting excited and begin telling me we need to turn left… And then right...And then finally they yell, “WE’VE GOT PIKACHU!”
I’ll be the first to admit I’m not a “gamer,” so my excitement was somewhat less than my kids’. Needless to say, with a record-breaking number of people downloading the Pokémon Go game, it’s now one of the most popular game apps.
Now, if you’re not sure what all the fuss is about, let me back up. Pokémon Go was released on July 6, 2016 by Nintendo. It’s a location-based reality game where the user downloads the app on their mobile device, and then hits the streets trying to locate and catch Pokémon characters. Just to give you an idea of its popularity, in the first week it was released it was downloaded 8 million times. With something so popular and lucrative, it was inevitable that hackers would take the opportunity to create massive security issues.
For personal device users, the risk of being hacked with wireless hacking tools such as Aircrack, Kismet, Airjack, downloading malware, potential issues with Nintendo’s security, storage and use of player’s personal data is very real. (Even more troubling, there have been reports that “real-life” criminals are using this app to draw-in players for actual robberies.) For businesses, this can potentially be a nightmare in terms of network security. Many employees use their mobile devices for both company and personal use. This creates a real exposure to a cyber breach or network security issue if an employee downloads an infected app and then connects to the company’s network.
However, there are a few steps companies can take to ensure that infected mobile devices don’t impact the company’s network systems.
- First, ensure all employee mobile devices that connect to the company’s exchange server have a third party encryption or mobile device management (MDM) application, like AirWatch.
- Second, make sure the company’s public wireless network, used for guest or employees’ personal devices, sits behind the firewall with specific content filtering enabled.
- Third, have a mobile device policy that outlines the acceptable usage for company-owned devices, personal devices with company use and personal devices accessing company wireless. This will help companies mitigate there risk to a cyber issue.
If you have further cyber security questions or concerns, our team has answers. Happy (secure) Pikachu hunting!
- Cyber Liability E-Book
- Handheld Risks
- No '911' for Cyber Security
- Hacktivism: A Growing Threat
- Anatomy of a Cyber Incident Response Plan
- Data Security Breaches Webinar Replay
ABOUT THE AUTHOR