User-friendly policies that make compliance easier, coupled with essential tools, give security managers the necessary approach to handle today’s mobile threat landscape.
With smartphones and tablets in wide use by workers, companies face a growing risk: the potential loss of critical data from lost, stolen, or poorly secured mobile devices.
The problem has reached a critical point as the number of mobile devices in use continues to grow. More than half of Internet traffic originates on mobile devices, according to Gartner. With smartphones and tablets becoming pervasive in the workplace, the risk to high-value business, customer, employee, and competitive data is immeasurable.
The 2018 Global State of Information Security Survey from PwC, CSO, and CIO found that 28% of senior business and technology executives cited mobile device exploits as the cause of security breaches at their organization, making mobile exploits the top threat vector they faced.
Check Point Software similarly found that 20% of companies said their mobile devices had been breached. Worse: 24% of those surveyed didn’t even know whether they had experienced an attack.
Mobile security requires an all-hands approach
Tracking potential mobile attacks may ultimately be the responsibility of a company’s CSO, but the most effective security policies require a much wider degree of adoption, enforcement, and adherence across the entire workforce. Here are some approaches that might be overlooked.