Feature Article

Free eNews Subscription>>
October 04, 2012

Data Loss, Mobile Malware among Top Threats of Mobile Computing

Data loss, mobile malware and data leakage were cited as “real and looming” security threats as they relate to mobile devices by senior-level executives in a new report released by the Cloud Security Alliance (CSA) Mobile Working Group. The report, “Top Mobile Threats,” found that the rapid adoption of mobile computing and immediate connection to cloud is raising concerns among enterprises around the world.

The report is a survey of more than 200 enterprise participants representing 26 countries globally aimed to provide industry guidance on where enterprises should place their resources and focus when it comes to addressing mobile security threats.

“Personally owned mobile devices are increasingly being used to access employers’ systems and cloud-hosted data, both via browser-based and native mobile applications. This without a doubt is a tremendous concern for enterprises worldwide,” said John Yeoh, research analyst for the CSA. “The results of this research will play an important role as we set out to develop much needed guidance on where time, talent and money should be placed when it comes to addressing mobile security threats.”

Rank of Top Mobile Threats

  • Data loss from lost, stolen or decommissioned devices
  • Information-stealing mobile malware
  •  Data loss and data leakage through poorly written third-party applications
  •  Vulnerabilities within devices, OS, design and third-party applications. Insecure Wi-Fi network or rogue access points
  •  Insecure WiFi, network access and rogue access points
  • Insecure or rogue marketplaces
  •  Insufficient management tools, capabilities and access to APIs (includes personas).
  • NFC and proximity-based hacking.

“The results of the CSA Mobile Working Group survey are testament to the security threats that mobile devices introduce to the corporate network,” said Patrick Harding, CTO, Ping Identity. “With more and more enterprises adopting a BYOD model, it is critical that mobile devices adhere to the same corporate security policies as other devices and that proper identity and access management processes are put in place to ensure the security and integrity of the organization.”

The BYOD phenomenon has become a significant part of the IT conversation, both because of the sheer number of devices and operating systems IT is now required to support, but also due to the strategies behind BYOD as opposed to the more traditional all-corporate-owned device strategy.

The upcoming Cloud4SMB Expo session, “How Cloud Can Help Solve Your BYOD Challenges,” will discuss cloud-based mobile management as a way to leverage cloud to support business’ mobility needs, including devices, applications and expense management. The session will be held at the Austin Convention Center on Oct. 4 at 1 p.m. and will include panelists from Okta, Concur Technologies and Firespotter Labs.

Want to learn more about cloud computing solutions geared specifically towards small to medium-sized businesses? Don’t miss the Cloud4SMB Expo, collocated with ITEXPO Austin 2012 happening now in Austin, TX. Stay in touch with everything happening at Cloud4SMB Expo. Follow us on Twitter.




Edited by Brooke Neuman


FOLLOW MobilityTechzone

Subscribe to MobilityTechzone eNews

MobilityTechzone eNews delivers the latest news impacting technology in the Wireless industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter