Back

Data breaches using mobile devices

  • By Elite CIO
  • Date Mar 07, 2019
  • Quotes8

1 out of 3 security incidents involves mobile as observed in last 2-3 years.

1 out of 3 security incidents involves mobile as observed in last 2-3 years. Organizations aren’t implementing MDM solutions to protect their mobile in similar way we protect systems. According to a study, surveyed 1000+ professionals, Mobile security will be a biggest threat for organization to secure organizational data and organizations are not ready to implement MDM solution due to higher cost. Mobile devices are likely of the same attacks as other devices such as desktop / laptop. Most of the phishing attacks and badly coded sites can affect them and mobile users might be more vulnerable. There are also mobile-specific exploits—like malicious apps and rogue wireless hotspots."

Companies are not ready to implement bare minimum mobile security standards

During survey, we have observed that most of the companies are failed to protect their mobile devices and was agreed off record. Organizations are talking about preparedness business operation using mobile device but without MDM. This is not due to a lack of awareness but may be due to budget and MDM solution cost. Almost half of respondents admitted that their organizations sacrificed mobile security to get the job done faster and nearly half of those that cut corners experienced a mobile-related security compromise.Meanwhile, less than 25 percent of those that didn't sacrifice security for speed and profit had a mobile-related compromise. Around 60 percent of incidents were described as major and 40 percent as major with lasting repercussions. Over half resulted in the loss of data and 58 percent also led to the compromise of other devices.

Mobile security – Big difference between security requirement and perception

There is a perception gap, 60%+ organizations believe that their precautions are either very effective or very less effective. 8-9% had implemented basic protections such as encrypting data on public networks,changing default passwords, access restricting etc.