Preview

Mobile Device Security Threats

Better Essays
Open Document
Open Document
1193 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mobile Device Security Threats
Mobile device security Threats:
Over the past two decades, we have witnessed significant technology advances in mobile devices, from the personal data assistants (PDAs) of the late 1990s and early 2000s to the ubiquitous and multifunctional smartphones of today. These advances have extended the virtual boundaries of the enterprise, blurring the lines between home and office and coworker and competitor by providing constant access to email, enabling new mobile business applications and allowing the access to, and storing of, sensitive company data. Mobile devices, such as smartphones and tablets, proliferate in today’s corporate environments. While there are significant opportunities to leverage these devices to increase the effectiveness of mobile workers, there are also significant concerns about the privacy of sensitive corporate data stored on the devices that IT must handle. Key Findings:

• Extensive use of mobile devices connecting to corporate networks
--89% have mobile devices such as smartphones or tablets connecting to corporate networks
--Apple iOS is the most common mobile platform used to connect in corporate environments
• Personal mobile devices that connect to corporate networks are extensive and growing
--65% allow personal devices to connect to corporate networks
--78% say there are more than twice as many personal devices connecting to corporate networks now than compared to two years ago
Security risks are on the rise because of mobile devices
--71% say mobile devices have contributed to increased security incidents
--The Android mobile platform is considered to introduce the greatest security risks
• Employee behavior impacts security of mobile data
--47% report customer data is stored on mobile devices
--Lack of employee awareness about security policies ranked as having the greatest impact on the security of mobile data
--72% say careless employees are a greater security threat than hacker

Mobile device risks
The



References: : 1) http://about-threats.trendmicro.com/us/mobile 2) http://www.f-secure.com/en/web/labs_global/mobile-security 3) http://ftc.gov/opa/2013/02/mobilethreats.shtm

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Some employees are using the company networks to access the Internet. Some expect the company to provide this type of access. This presents a number of challenges to company network management. Identify three challenges and suggest strategies for a company to address these challenges.…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    The number of mobile applications is expected to reach $75B with 70% of the applications geared towards smart phones (Joseph, 2009). Not only are commercial, civic and private organizations utilizing this technology, armatures worldwide have also engaged this technology adding thousands of other unique applications to the thousands currently available. Organizations whether they are civic, commercial or private must join the mobile revolution to remain competitive and relevant.…

    • 3576 Words
    • 15 Pages
    Best Essays
  • Satisfactory Essays

    Speculate whether employers should have more or fewer rights to monitor employee use of company equipment, such as laptops, tablets, and cell phones issued for out-of-office, potentially after-hours work. Suggest at least three methods for an employer to monitor its employees’ use of company equipments. Provide a rationale for your response.…

    • 297 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Ninety-six percent of consumers have researched a product or service on their device, and thirty-five percent have made a purchase on their phone (Ansaldi, 2013). This trend between smartphone and consumer has raised the idea that the workforce should also follow suit in order to adjust to the habits of modern employees when they have been removed from the workplace. The entire idea surrounding BYOD holds that people become so attached to their personal devices that they prefer their own technology to foreign technology. The use of one’s own technology, as a result, would cause employees to be more productive all whereas they ensure the safety and upkeep of their personal work-related devices. Heralding back to vast use of smartphones to access the internet, most employees send e-mails and produce work-related documents while being off of work (they may or may not be using their smartphones to do this). A BYOD policy would only lessen the gap between job-related work that has been saved at home and job-related work saved on a company computer. Why not make things easier and have everything saved in one place? Companies see this trend as even greater an opportunity to implement BYOD programs, albeit with specific…

    • 1383 Words
    • 6 Pages
    Best Essays
  • Good Essays

    References: Milligan, P., & Hutcheson, D. (2008). Business risks and security assessment for mobile devices, Audit and Control Association. www.isaca.org…

    • 610 Words
    • 3 Pages
    Good Essays
  • Better Essays

    How many times do you check your phone or PDA everyday? Every hour? Half hour? Ten minutes? Most people can’t even go one whole day without their communications devices at the ready. Have you ever stopped and wondered how we even got to this point in the first place? The answer is growing interactive technology within our communications devices. From gaming, to movies, to buying online products, virtually anything to do with the consumer can be done from a smart phone or PDA device now. The history and workings of interactive technology has changed communications devices by becoming more widely used, more common with business integration, and by becoming more user friendly.…

    • 1215 Words
    • 5 Pages
    Better Essays
  • Good Essays

    “They have an app for that” is the mantra of most smartphone users, but an improperly configured smartphone can be an open invitation to hackers looking for easy information. Today’s modern smartphone can do anything from controlling your home computer to handling your online banking to watching TV to making video calls. With all the features included in them, they are very easy to stockpile important (and sometimes sensitive) information about the user. Since smartphones are essentially tiny computers, they suffer the same vulnerabilities of PC’s, including viruses, malicious applications, and hacking. If there is the tiniest flaw in the smartphone’s armor, hackers can gain access and take an enormous amount of data from it.…

    • 913 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    I Love It

    • 1840 Words
    • 8 Pages

    Microsoft Information Technology (Microsoft IT) lacked a timely solution for keeping pace with the surging trend of employees who use personal devices to do Microsoft work. Without a user- and IT-friendly way to bring all devices into the scope of centralized management, IT risked improper exposure of secure company data, among other concerns.…

    • 1840 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Smartphone Security

    • 2339 Words
    • 10 Pages

    Mobile phone operators can stop SIM cards and stop expensive calls from being made. However, a smartphone differs from regular mobile phones. Executives carry all kinds of information on the device, from confidential announcements, to financial results and business in progress. If any of these were ever lost, it could result in the lost of business and trust within company IT infrastructures.…

    • 2339 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Mobile devices dominate consumer use as such integrating them into the workplace is inevitable. “This surge in the use of mobile devices within a business enterprise potentially gives rise to various risks that need to be identified and effectively managed to avoid irreversible security and, ultimately, enterprise detriments” (ERM, 2014). While maximizing the business opportunities, in the process of integrating the systems, it is imperative to use best practices and effective security controls should be implemented in order to manage the enterprises’ risk (ERM, 2014). A recent paper issued by the Security for Business Innovation Council (SBIC) provides an analysis of the risks along with the recommendations and the valuable insights of nineteen security leaders from large global enterprises. For business to achieve operational partnership that is powered by information technologies great care must be taken to protecting information. As enterprises, face mounting regulatory pressures and escalating threats information security has become very important. Without the right security strategy, business innovation could easily be stifled or the organization put at great risk. In order to understand the risk factor, consider the factors that define the current mobile device (MD) use.…

    • 2925 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Mobile Phone Security

    • 1564 Words
    • 5 Pages

    This fact sheet has been developed for the Consumer Education Program by the Communications Commission of Kenya. It was compiled by studying material from various authoritative sources and adopting what is universally acceptable and relevant to the Kenyan situation. The fact sheet is intended to enable Consumers have a good understanding of the issues discussed and hence empower them when making decisions regarding ICT products and services. Introduction One of the biggest threats that a mobile phone user faces today is loss or theft of the phone. Not only is the mobile valued as a physical device, the phone may contain personal and financial data stored in the handset or in the phones subscriber identity module (SIM card). While a stolen SIM can be barred by a mobile network once the theft has been reported it is a bit harder to bar the handset from being used with different SIM card. Unless the user had protected his personal information with a PIN prior to the theft or loss of the phone, this data can be accessed by unauthorised persons. Mobile phone users normally store a wide range of information on their phones. This information can either be stored in the phone’s internal or external memory (depending on the make and model of the phone) or in the SIM card. The SIM card is used mainly to store contacts and short messages while the phone’s memory is used to store information such as personal photos, emails, and calendar items. In order to prevent unauthorised persons from using the phone and further gaining access to the stored information, some mobile phones have security features which the user can activate. This fact sheet has been developed to address security of the information stored and what to do should you lose the phone. Securing the information stored. There are at least two methods one can use to secure the information stored on a mobile phone. These are: a) SIM lock This method takes advantage of the SIM card…

    • 1564 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Mobile Security

    • 3398 Words
    • 14 Pages

    Parekh Tanvi SIMS, Indore tanvi.parekh@sims-indore.com Gawshinde Sonal SSSIST, Indore sonal209@yahoo.co.in Sharma Mayank Kumar IET-DAVV, Indore leomayank @yahoo.com…

    • 3398 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Bring your own device

    • 3020 Words
    • 13 Pages

    Organizations that do not have IT oversight managing its employees’ mobile devices unintentionally consent to making their assets vulnerable to attack from uninformed user behaviors like improper configuration and risky wireless connections (Search Consumerization). With the mobile market’s flux state adding new emerging technologies rapidly, companies have had to adjust from having their networks only accommodate few devices. Initially, laptops accessed the network through limited VPN concentrators and desktops provided access points for PDAs through synchronization. With new technologies, single devices now may encase several forms of connections: Ethernet, WiFi, Bluetooth, and 3G. Networks now accommodate off-site users through a myriad of application portals and on-site users connected through Wi-Fi accessibility and Bluetooth-enabled desktops. Each connection form provides a unique opportunity for attack. Under BYOD policies, corporations must institute a comprehensive mobile inventory that they manage device discovery. New technological circumstances create scenarios that single devices utilize several connections and individual employees possess many devices of which they may utilize concurrently.…

    • 3020 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    It’s likely that Dr. Martin Cooper, who created the first U.S. analogue cell phone, never imagined that we would someday be able to view, share, and download information right over our mobile devices. That phone was made nearly four decades ago, and in the time since 1973, we have developed and re-developed mobile technology many times over. Consumers have become so attached to, and dependent upon, mobile technology that industry giants, like Apple, are believed to have more cash surplus than the U.S. government. It’s this intense interest that has caused the rapid research and development of cell phone and tablet technology.…

    • 1969 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    life without technology

    • 3145 Words
    • 13 Pages

    The common plight of smartphones and mobile devices is that they are shackles that handcuff an employee to their work…

    • 3145 Words
    • 13 Pages
    Good Essays