Tag: mobile security technology

Mobile security threats change by region

Geography has been found to play a considerable role in the type of issues faced by smartphone owners.

According to the latest report that has been issued by mobile security company, Lookout, threats seem to appear and linger in based on geographical factors, meaning that the types of malware and other dangerous problems that could lead to smartphone and tablet based issues differ from one place to another.

This report was considered to be the first of its kind and used threat data gleaned from the Lookout Platform.

The mobile security report took a deep look into the treats from five different countries and identified that the key issues are different from one area to the next. The five countries that were examined were: Germany, the United States, the United Kingdom, Japan, and India.

The report also pointed out that mobile security threats are continually and rapidly evolving.

Mobile security by regionAccording to Lookout, within the report, “As mobile marches on, the threat landscape continues to evolve. Like any entrepreneur, the bad guys go where the opportunity exists and focus on the business models that are most successful – and like many businesses, there are differences that can be seen at the country level based on economics of a given region.”

At the same time that the report was issued, Lookout also released an infographic to underscore the largest threats in mobile security, based on location. The types of threat that were analyzed included adware, chargeware, spyware, surveillance, and Trojans. In all countries, it was adware that dominated the detections in each of the countries, as a result of the lack of solid guidelines to outline what is and is not acceptable for smartphone advertising, and because unscrupulous methods are proving to generate greater payouts.

Surveillance was found to be a popular form of mobile security threat in the United States, after marketers that use it have identified a quasi-legal position in which to apply it. As the barrier to entry is lower in this market, it gives developers the opportunity to target a wider audience. Similarly, Germany had the largest instance of Trojans and the United Kingdom saw the largest occurrence of chargeware. The number of threats in Japan were comparatively small next to the other countries in the report. India, on the other hand, saw a relatively high adware instance.

Mobile security incidents experience by most companies in 2012

A report from Check Point Software revealed that for nearly half of them, this led to over $100,00 in damages.

A recent report produced by Check Point Software, which was published under the title of “The Impact of Mobile Devices on Information Security” has indicated that over the 12 months preceding their survey 79 percent of businesses experienced an incident relating to mobile security.

The survey not only determined that these issues were quite common but they are also very costly.

The survey included the participation of 790 IT professionals. It was conducted by Dimensional Research, which discovered that for 42 percent of the businesses that experienced these mobile security incidences, 42 percent said that it cost over $100,000 to repair the damages. Moreover, for 16 percent of the participants, the cost of these incidents was greater than $500,000.

Among large businesses, 52 percent said that mobile security incidents cost them over a half million dollars.

Mobile Security ProblemsNearly all of the companies that permitted the use of personal smartphones said that there is a growth in the number of these devices connecting to their corporate networks. Moreover, 45 percent of them said that there are five times more personal smartphones connecting to those networks than there had been in 2011.

At the same time, the research suggested that 63 percent of the participating businesses do not manage the corporate information over personal smartphones. Furthermore, 93 percent have stated that they have struggled to implement policies surrounding their BYOD programs. In fact, 67 percent felt that mobile security regarding corporate information is their primary challenge with BYOD policies.

Check Point mobile security evangelist and researcher, Tomer Teller, explained in a statement that “Without question, the explosion of BYOD, mobile apps, and cloud services has created a herculean task to protect corporate information for businesses both large and small.” He added that “An effective mobile security strategy will focus on protecting corporate information on the multitude of devices and implementing proper secure access controls to information and applications on the go. Equally important is educating employees about best practices as majority of businesses are more concerned with careless employees than cybercriminals.”