- Log In
There’s a hidden challenge enterprises face when securing mobile devices: some apps that are legitimate and useful in a personal context may introduce a major risk for an enterprise.
While it may not be immediately evident, there are in fact two different categories of harmful applications to an enterprise: malicious apps and risky apps.
As the person responsible for securing mobile devices in your enterprise, you must focus on those apps that intend to do harm, but not forget those that may not be intentionally harmful, but still introduce risk. What’s the difference?
Updating your software is sometimes an inconvenience, but it’s also necessary to keeping up your mobile security hygiene.
Sometimes updates require connecting to a power source, backing up data, or temporarily losing access to an app or service while the update processes. Whatever the reason, oftentimes we see that little tally of available updates increase and increase.
The problem is, there are many critical security fixes that get pushed through these OS and app updates and when we ignore them, we leave ourselves vulnerable and open to attack.
Kemoge, or what we call ShiftyBug, is a piece of Android malware that roots a victim’s device and installs itself as a system application, making it very difficult to remove. Its end game is to install additional applications on the to the device.
There are eight different exploits packed into the malware that are tailored to root that specific kind of device, the majority of which impact Samsung devices.
Jailbreaking your iOS device (or rooting in the case of Android) is tempting. After all, who wouldn’t want access to a whole new world of apps, easier international travel, and more control over their phone?
If you’ve felt the lure to read the latest jailbreaking/rooting tutorial and take the plunge, you’re not alone: An estimated 7.5 percent of all iPhones—amounting to more than 30 million devices worldwide—are jailbroken. Jailbreaking is especially popular in China, where an estimated 13 percent of all iPhones are jailbroken.
When you hear about major corporate breaches in the news, they don’t always originate from the same threat vector. Sony was allegedly hacked through PCs, Target through point of sale systems, J.P. Morgan likely through unprotected server infrastructure, the IRS through its “Get Transcript” app.
According to a new report from IDG Research, mobile is an important vector for attack. Seventy-four percent of IT leaders from global enterprises report that their organizations have experienced a data breach as a result of a mobile security issue.
It’s hard to remember the myriad of passwords we use for our accounts online. There are a number of ways we hear of people dealing with this: writing them down on a piece of paper, using the same password across all your accounts, etc.
One of the most concerning practices we’ve heard of, however, is storing your passwords in your mobile contacts.
This is a definite “don’t do,” in our books.
October is a great month — it’s finally cool outside, pumpkin-flavored food is everywhere, and it’s Cybersecurity Awareness Month.
Bet you didn’t know that last one. We’re excited about Cybersecurity Awareness Month because, clearly, security is something we take very seriously. As the world becomes more connected, we believe security needs to be at the forefront of people’s minds as they use mobile devices to live every day life.
During the month of October, you can find a Lookout blog post every week with some great insights into our behaviors on mobile devices and how we can change those behaviors to keep our devices and data safe and private. Here’s what you can expect to learn.
Good security relies on strong relationships. The security industry wants to work with hackers, to learn from them and understand their modes of thinking. Security professionals want to share information to ensure everyone understands the broad scope of threats and what they can do to corporate data. Similarly, security technologies want to connect together to deliver new depths of protection.
This is especially the case in the mobile industry. There is no silver bullet to mobile security. It takes specialization — experts working together — to ensure the bases are covered.
Threat protection and enterprise mobility management solutions play together perfectly in this way in that both help enterprises see and manage the risks associated with mobility so that employees are empowered to embrace it.
If you’re an individual Lookout user running iOS 8 (or below) or an enterprise customer running any version of iOS, Lookout protects you from XcodeGhost by automatically detecting and alerting you to the offending app.
With roughly half of the iOS user base still running iOS 8, we’re happy to be able to offer this protection to a large percentage of our users.
Unfortunately, due to limitations in iOS 9, we cannot currently protect individuals on the new operating system through our consumer app, but we are working to find a solution that will keep our users safe. If you are running iOS 9, here is a list of affected apps and what you should do.
Due to Apple’s enterprise app distribution approach, we can protect enterprise users of Lookout Mobile Threat Protection, regardless of which version of the OS they are running.
To download Lookout for consumer use, visit the app store.
To learn more about our Enterprise products, visit our Mobile Threat Protection page.
It’s hard to believe that Lookout is nearly 8 years old. What started as a pipedream to solve emerging mobile security challenges has become a thriving business that employs more than 300 people in development centers across San Francisco, Boston and Toronto, along with sales office around the world.
During this time, we’ve transitioned from a small startup to a scalable, growth stage company. In the process, we’ve expanded beyond a purely consumer focus to include the complex security issues that large enterprise customers face today.
Over the past several months, we’ve also taken some time to create a set of core values that align with our mission and vision. It’s easy to shrug off values as a pointless exercise—it’s all about revenue, right? Not at all. Any seasoned leader knows building a sustainable business is not only about product, but about great people and the value system that guides them on a daily basis. “Life at Lookout” defines the values that will serve as our North Star through our next stage of growth.
So, I wanted to take a moment to recap the principal attributes we aspire to embody at Lookout.