Cybercrime: The Next Big Target, Your Smartphone [VIDEO]

Leading analyst house International Data Corporation (IDC) recently released a written report showing two trends are increasing the risk of smartphone cyberattacks. First, Q1 2013 smartphone sales finally surpassed regular feature phone sales. 2d, total smartphone sales increased 41.6 pct. So why does this increment the smartphone threat level?

Cybercriminals have e’er been attracted to the most pop platforms. The kickoff widespread PC viruses were on the early Apple tree platforms, such as Apple Two and Apple tree IIc. Nonetheless, the threat shifted to the IBM PC the same year that IBM sales surpassed Apple PC sales. Web browser threats followed the same design as they ofttimes exploited Internet Explorer until Firefox and Chrome became widely used alternatives. Today, fifty-fifty Safari is at run a risk, only mainly due to cyberthreats that exploit Java and other popular common components.

All the same, today’s cyberattacks take a wide diversity of objectives. They are non all focused on a single smartphone platform. For example, while IDC reports just a 17.3 pct overall market share for the iPhone, it is withal very popular in many sectors of business making it a primary conduit to achieve victims. Conversely, cybercriminals looking to attack a broader audience will likely target Android-based devices.

IDC also recently conducted the 2013 U.S. Mobile Security Survey where they interviewed 200 IT decision-makers to approximate their stance on personal mobile devices (PMDs) in the enterprise. Turns out, 62.five percent of all respondents said their system embraces the bring your ain device (BYOD) movement. In improver, more than than 50 pct of employees access corporate data on mobile devices while traveling on business.

Mobile security education, tools and best practices

Most organizations adopt BYOD to aid their nomadic workforce exist more productive. The problem is mobile devices, specifically smartphones, seldom take adequate mobile security software. Mobile security risks likewise extend to the growing use of tablets in the workspace. Mitigating this risk requires a combination of educational activity, security tools and best practices.

Education should begin by helping users understand that the threat is real and present. No platform is condom, and all apps are suspicious. Both iTunes and Google Play have unknowingly distributed malicious apps. Also, jail-breaking a device is the height of mobile recklessness. Unfortunately, many users perceive mobile threats as ‘hype’ and do not respect the potential impairment their device tin inflict on the organization. In addition, recent surveys have revealed that 30 to l percent of users do not countersign protect their devices. The Websense 2013 Security Predictions includes a spotlight article on mobile threats. Simply sharing it may assistance y’all brainwash your users.

Security tools must extend across mobile device management (MDM) and must accost both threats and information loss protection. This 3-Stride Program for Mobile Security details how to apply layered defense strategies to mobile platforms. Information technology tin no longer settle for single solution defenses. Lost and compromised devices threaten the security of intellectual property.

To help yous formulate your mobile security strategies, Websense recently recorded an interview with several executives to gauge their thoughts on mobile cyberthreats.

How have y’all tackled mobile security?

Forcepoint is the leading user and data protection cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.

Source: https://www.forcepoint.com/blog/insights/cybercrime-next-big-target-your-smartphone-video

Check Also

Will Dogecoin Go Up In Value

Will Dogecoin Go Up In Value

On Dec. 6, 2013, Billy Markus and Jackson Palmer decided to combine their dearest of …