On the Frontlines: Endpoints and Your Insiders

Comscore reported that half of all digital time was spent on smartphone apps, and that a total of 68 percent of time was spent on a mobile device. So it’s hard to not to see how mobile security is fast becoming a security problem for companies and organisations.

On the Frontlines: Endpoints and Your Insiders

BYOD, bring your own device, has become so widely accepted. ZK research recorded that 82 percent of businesses now have some kind of BYOD in place. It should be stated though that it is not so much these BYOD plans that are putting organisations in vulnerable situations, but rather the fact that these devices are predominantly mobile and can be connected from virtually anywhere. Company owned mobile devices are of course easier to keep in compliance with corporate policy, but ultimately, both individually owned and company-owned mobile devices are putting organisations at risk.

The Check Point survey found that in organisations where more than 2,000 devices are connected to the network, there’s a 50 percent chance that at least six of those devices are infected. In the 2016 Endpoint Security Survey released by the SANS Institute on behalf of IBM, almost half (44%) of respondents stated that one or more endpoints had been breached in the previous 24 months, creating a mobile security incident within the organisation. Astonishingly, as much as 45 percent of data is stored on the endpoint, usually not even slightly protected by the most basic security policies.

ALSO SEE: The Security of Things: How will IoT Impact Data Security?

In terms of mobile devices and confidential information, data is vulnerable in a number of different ways: email phishing, malicious attacks, unsecured apps, lost or stolen devices and/or public Wi-Fi. However it is the fact that login credentials being the most commonly exfiltrated is what is most concerning as these can be difficult to detect.

Mobile is fast becoming a critical component of organisations and businesses, however without the correct security, mobile can also fast become an organisation’s biggest downfall. It is therefore baffling, for lack or a better word, that “security for mobile devices is still not considered as high priority as security for other computing platforms.”

Organisations need to begin protecting themselves, and the mobile device needs to be considered in the same context as any other endpoint connected to an organisation’s networks or used by employees.

Rosie Goldsack

Rosie Goldsack

With 5 years experience in content creation in the media and technology industries, I am always on the lookout for the next big thing to write about. My educational background in literature and linguistics taught me the rules of writing, while my professional experience has brought back to me the joy of writing. Information security has always been an interest of mine and I am happy to be able to share with Teramind readers the importance and value of online security.Rosie can be contacted at Rosie@teramind.co

You may also like...

2 Responses

  1. Bifty Alex says:

    Nice article Rosie. You summed up a great information here. After reading this, You cleared my so many concepts about BYOD. With increasing usage of mobile devices among enterprises it has become essential to plot a security policy around this mobility. But I am sure there are always certain security risks associated with it, would you like to say something about it.

Leave a Reply

Your email address will not be published. Required fields are marked *