Android devices, tablets, and jailbroken devices top list of riskiest mobile products in the enterprise setting.
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
As mobile devices continue to become more sophisticated and more integral to employees' everyday work lives, these mini computers in our pockets and handbags continue to become bigger and bigger threats to IT security.
"The proliferation of the devices is happening so fast, and people are now pushing the limits on what they're using the devices for, that IT is having a hard time keeping up," says Dave Hansen, CEO of Numara Software.
So many devices are big risks because critical information runs freely through them and security procedures are ignored for the sake of expediency--these are tools built for convenience, after all. Most troubling, it is often the executive suite that champions fewer security controls so they can continue to use these mobile tools without fetters. That leads to an almost willful ignorance from IT, who would rather not butt heads with senior management.
"It's bizarre. I was a CIO for a Fortune 500 company, and I remember five years ago when I was the one that put passwords on BlackBerrys and thought they were going to burn effigies of me in the lobby," Hansen says. "There was yelling and debating going on at the executive level as to why we would to that."
But ignorance gets us nowhere. In order to mitigate the risks, IT first needs to identify them. The following three devices are some of the biggest security threats to your infrastructure, whether you know it or not.
Devices running on Android OS are increasingly becoming a favorite among hackers for two big reasons: market share and openness.
As the number of Android devices has proliferated in the market, it becomes an ideal medium for attackers to look for common vulnerabilities and quickly spread malware.
The Year in Security: 2017A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
The State of RansomwareRansomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Published: 2017-05-08 unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).
Published: 2017-05-08 A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...
Published: 2017-05-08 Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.
Published: 2017-05-08 Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.