Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Pin on PinterestEmail this to someone

Mobile security breachesCheckpoint is a billion dollar, international IT security software company offering products for network, cloud, data and mobile security.  Their Third Annual Mobile Security Survey was just published last week.  The survey queried nearly 800 IT professionals in the U.S., Australia, Canada, Germany, and United Kingdom.

 

Mobile continues to proliferate on all fronts both for personal use and within a company environment, and use of mobile applications is growing at exponential rates.  As such, mobile is a critical technology whose vulnerabilities need be known and tracked.The survey showed that careless employees rated as a higher concern than do cyber criminals.  Once again here’s evidence that the Human Element trumps technology as being the critical factor in maintaining  good security.

 

Unlike desktop computers, mobile devices don’t always have our full attention.  Their function is after all to help us cram even more multitasking productivity into a day.  A message pops up with an update request during a meeting, you hit “OK” without thinking, and poof, you are hacked.

 

Common mobile security breaches include:

 

Device loss and theft.  Loss of company data stored on these devices can run the gamut from devastating to just really annoying.  Password protection can help mitigate the loss; especially critical is access to important applications.  And obviously, having remote disabling software in place.

 

Malware.  Malware can take over a smart phone’s data connection, it can use it to send spam emails, harvest passwords or infect other devices on a network.  Mobile devices are becoming a bigger hacker target than desktop computers, in part because of the lag in securing mobile.

 

Unsecured networks.  Although more common in Asia than in North America or Europe, it is possible for a hacker to set up a rogue Wi-Fi network to trap people logging in at airports or cafes.  Users need to access Wi-Fi with caution.

 

Read full survey report here