January 4, 2018

-
min read

New Survey Indicates Mobile Risks Are High, Visibility Is Low

A new study from CSOonline.com and Lookout reveals that while most IT and business leaders believe that mobile threats and risks to corporate data are a real problem, their visibility into these risks is lacking.

Mobile risks impact employees in corporations around the world daily. For example, Igexin is a malicious ad SDK that spied on its victims through innocent apps. SonicSpy is another mobile spyware operation, was found in thousands of apps on (and removed from) the Google Play Store. Risks may include non-malicious apps that send contact information off the device, or employees falling for phishing attacks. We call this the Spectrum of Mobile Risk.

Still, with all of the mobile threats to corporate data that IT and business leaders are up against, 75 percent of respondents said their "organizations need to increase visibility into mobile risks."

Today, 94 percent of IT leaders say a comprehensive solution is the number one factor for mobile security. This means corporations need to invest in a security solution that address the full Spectrum of Mobile Risk, including mobile threats, risky behaviors and device configurations, and mobile vulnerabilities.

Learn more about what IT leaders are saying today in the CSO and Lookout infographic below.

IDG Visibility Infographic


Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization
Collaboration

Book a personalized, no-pressure demo today to learn:

Discover how adversaries use non-traditional methods for phishing on iOS/Android, see real-world examples of threats, and learn how an integrated security platform safeguards your organization.