The Growing Threat of Mobile Device Security Breaches conducted by Dimensional Research sponsored by Check Point Software on mobile security, reveals that almost two-thirds (64%) of the 410 managers polled doubt that their company is able to prevent a mobile attack.
The 20% of respondents, however, said their company has already suffered a security breach via mobile devices, while another 24% did not know whether the devices of their employees were being violated.
94% of computer security professionals has also expected that the frequency of mobile attacks increases rapidly over the next year. However, only 38% of respondents said that their company uses a mobile solution from different Enterprise Mobility Management security solutions to protect against attacks.
That mobile malware proved to be the most common type of the mobile attack. 58% of respondents in fact registered malware attacks against mobile devices of their company, 54% of phishing exploits SMS and another 54% of network attacks Wi-Fi or exploit man-in-the-middle. 41% also reported the theft of credentials and keylogging exploits against cell.
The movable violations are also expensive. 37% of respondents said that the cost of a moving violation for their company would be more than $100,000, while 23% stated that it would cost more than $ 500,000. These costs are similar to those estimated for a violation desktop PC or laptop, showing the amount of sensible data stored on mobile devices and the ease of access they offer to corporate resources.
Over 60% of respondents then cited the lack of resources (both budget and personnel) as the primary concern for not having implemented a security solution for mobile devices. However, 62% of companies are allocating more resources to the mobile security initiatives than in previous years.
It is clear from this survey as security professionals are struggling to protect the growing number of the mobile device in their endowment. It’s a question that needs to be addressed urgently, given the strong increase in mobile attacks that are expected during the next year.
Since the use of the mobile devices is increasingly popular in today’s enterprise, they must protect them all (both of properties and those BYOD ) with a holistic solution that blocks malware and network attacks and prevents data loss and theft of credentials without affecting the user experience.