Mobile Security By The Numbers
Rounding up the latest research on mobile malware and security practices.
March 2, 2015
Currently three out of four businesses require users to at least secure their devices with a username and password to log into their devices. But two-factor authentication is going to gain momentum in mobility in the next two- to three years.
Source: Alcatel-Lucent
Mobility is forcing enterprise CISOs to rethink their security policies. According to survey conducted by Vanson Bourne on behalf of CA, nearly half (49%) of all organizations report seeing a significant or big impact of mobility on their security practices and policies for employees or customers.
Source: CA
Samsung Pay may have made news this weekend with its flashy "me-too" send-up of Apple Pay, but the fact is that consumers are still skeptical about the security and privacy of these mobile payment systems. Hardly surprising given how insecure even the most established payment card systems remain, even after decades of evolution.
Source: Tripwire
The need for secured applications changes subtly by form factor. According to mobile security firm Good Technology, users with tablet devices request secured document editing and access above all others. Meanwhile, smartphone users are more concerned with secure messaging and browsing.
Source: Good Technology
Last year, Android apps reached a major milestone in that researchers from Alcatel-Lucent found that the number of infected Android devices equaled the number of infected of Windows machines in the wild. According to the researchers, the bulk of the infections came from Trojanized apps able to propagate within the open app marketplace sponsored by Google.
Source: Alcatel-Lucent
The sheer volume of mobile apps produced for enterprise, SMB, and consumer markets--along with prevailing attitudes that PC security matters more than mobile--contributes to a growing avalanche of mobile apps that haven't been properly secured.
Source: BlueBox
As ubiquity of mobility paired with the availability of cloud continues to drive major technological disruptions within just about every type of enterprise transacting business today, CIOs and CISOs are increasingly put on notice to incorporate mobile into their security plans or risk irrelevance. Over the past several months, numerous surveys and studies have done a good job offering up some statistical proof points about the scope of the mobile security dilemma. We've broken down some of the most salient stats for our readers.
As ubiquity of mobility paired with the availability of cloud continues to drive major technological disruptions within just about every type of enterprise transacting business today, CIOs and CISOs are increasingly put on notice to incorporate mobile into their security plans or risk irrelevance. Over the past several months, numerous surveys and studies have done a good job offering up some statistical proof points about the scope of the mobile security dilemma. We've broken down some of the most salient stats for our readers.
Currently three out of four businesses require users to at least secure their devices with a username and password to log into their devices. But two-factor authentication is going to gain momentum in mobility in the next two- to three years.
Source: Alcatel-Lucent
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024