AGAT

Categories
BYOD Endpoint Security Mobile Security Uncategorized

Mobile security seen as the major IT security risk in 2014

The vast majority of IT security professional view mobile devices as the biggest security threat in the upcoming year, according to a report published by the Ponemon Institute and Lumension.

The report, entitled “2014 State of Endpoint Risk,” indicated that 75 percent of respondents said mobile devices, such as smartphones, represented the greatest risk of potential security within the IT environment.

The survey, which included 676 IT and security professionals,  stated that mobile endpoints were vulnerable to malware attacks, with 68% saying their mobile endpoints had been the target of malware in the last 12 months.

“Endpoint security risk is more difficult to manage than ever. The reason is the growing number of employees and other insiders using multiple mobile devices in the workplace followed by the increase in personal devices connected to the network and the growing popularity of public cloud services such as Dropbox,” the authors said.

When asked what plan their organizations had to secure employee-owned devices, 43% said they intended to use existing security plans, while 11% said that they had stricter security standards for BYOD (bring your own device) than for corporate-owned devices.

Of those who said their organizations had a BYOD security plan, 54% said they were relying on voluntarily installing an endpoint protection agent. Other steps included mandatory enrollment in company Mobile Device Management (MDM) solutions through technological means (35%) and a mandatory endpoint protection agent on laptops through technological means (32%).

Categories
BYOD Mobile Security Uncategorized

Cyber criminals shift their focus to mobile devices

A new report by Juniper Research suggests that cyber criminals are transitioning their focus from PCs onto mobile devices. The research shows that as BYOD (bring your own device) policies become more popular, the threat from unprotected employee mobile devices is becoming more important.

The report, Mobile Security: BYOD, mCommerce, Consumer & Enterprise 2013-2018, predicts that the number of smartphones and tablets used by workers worldwide will exceed 1 billion by 2018, representing almost 35 percent of the total consumer base.

The research company said that organizations adopting BYOD strategy need to consider mobile devices as just another endpoint and need therefore to devise measures to mitigate the challenges and the risks of managing a multi-platform environment.

Juniper said that more than 80% of smartphones will remain unprotected through 2013, despite a steadily increasing consumer awareness of mobile security products.

The report indicates that nearly 1.3 billion mobile devices, including smartphones, featurephones and tablets, are expected to have mobile security software installed by 2018, up from around 325 million this year.

Juniper experts note that handsets might be lost or stolen and can be the cause of financial and privacy loss. Moreover, almost all malware threats are capable of damaging mobile devices or stealing the user’s personal information.

They added that both private and public sectors are now increasingly the target of different types of attackers; hackers, botnet operators, cyber-criminals, terrorists and even foreign governments.

Juniper said that the first three groups mainly attack for monetary gain, either by directly hacking the bank account of business segments, or by taking control of enterprise mobile devices to access sensitive business data, such as a business plan or corporate strategy. The other two groups may attack government security systems via mobile devices as part of their information gathering or espionage activities, thereby posing a direct threat to national security.

Categories
BYOD Mobile Security Uncategorized

The risks of BYOD policies for businesses

A survey published this week indicates that The majority of IT and IT specialists believe their companies do not use tools or policies to protect corporate data from risks arising from Bring Your Own Device (BYOD) policy.

The research, which was conducted by the by the Ponemon Institute for Zix Corporation shows that 60 percent of IT professionals are unsatisfied with current BYOD solutions, mostly due to cost and inadequate security.

The report shows that 56% of IT managers claim their companies are looking to replace their current BYOD security solution. Moreover, an alarming 46%, those working in companies that support BYOD, said they do not use tools or policies to protect corporate data.

It is also interesting to note that 28% of respondents said that their companies have limited BYOD deployment due to and inadequate security tools (28%), while 37% answered that their companies use mobile device password policies only.

BYOD is clearly on the rise but organization using such policy should remember that risks include:

  • Smartphones and tablets are easy prey for thieves and people often lose their phones or leave them unattended in public places
  • Devices are personally owned, changing employee expectations about privacy and security.
  • Employees take work off-premises: A Harris Interactive Poll (2011) found that more than 50 percent of employees use portable devices (smartphones, tablets, laptops, and flash drives) to take sensitive information outside company facilities.
  • Employees are liable to copy data from the corporate network onto their personal devices even when told not to.
  • Employees value convenience more than security and if a security policy is overly cumbersome or inconvenient, employees will find a way around it.
  • Lack of effective tools to enforce a secure BYOD setup.