Enterprise mobility has created a new field of weak endpoints for attackers to exploit via sophisticated cyber security threats.
However, the 2015 Verizon Data Breach Investigation Report found that just 0.03% of smartphones were infected by advanced malware per week — which proves to enterprise security professionals that attackers prefer other means of launching APTs.
In this case, why are we even asking if mobility is the greatest enterprise cyber security threat? It turns out the answer is more complicated than the Data Breach Investigation Report lets on.
Mobility is Bridging the Gap Between Consumer and Enterprise Cyber Security Threats
A number of daunting mobile cybersecurity threat statistics focus on the increasing danger of consumer vulnerabilities, mostly resulting from lack of password protection or jail-broken devices.
These may seem irrelevant in an enterprise setting, but mobility is bridging the gap between consumer and business threats. Over 40% of employees in the US use their personal mobile devices for work. Therefore, any threat to mobile consumers is becoming a threat to enterprises.
As consumers add vulnerable endpoints to the network, consider these threat stats:
Mobile Devices as an Entry Point - What Happens if Your Network is Breached?
“The reality is that the threats targeting mobile devices have not changed. There are still two main causes of data loss on mobile devices: physical device loss and misuse of apps. What has changed is the severity of the consequences. Mobile devices are now storing and accessing more-sensitive data.” – Dionisio Zumerle, Research Director at Gartner
Mobile devices aren’t a fad in the business world, and it’s clear that they’ll continue to be increasingly essential to daily operation. However, approximately 75% of available mobile apps will fail basic security testing, giving attackers plenty of chances to launch cyber security threats.
The question isn’t when attackers will compromise mobile devices for a data breach, but how they will attack enterprise mobility.
The Verizon Data Breach Investigation Report explains why mobile malware doesn't even comprise 1% of cybersecurity problems. Yet, the real problem is that you shouldn’t be concerned about individual pieces of mobile malware, but rather the greater weaknesses that could fuel an advanced attack.
What can you do when attackers compromise one of your weak mobile endpoints and gain access to your network?
Many enterprises have hardened their networks, but when attackers gain a foothold, internal defenses aren’t nearly as strong. Deception technology can harden your internal defenses to keep attackers from accessing the enterprise regardless of the entry point.
The illusive networks'® Deceptions Everywhere® architecture layers the network in deceptive information to bog attackers down in a constant question of what data is real and what is illusive as they attempt to make their way through your systems.
This approach takes the focus off specific malware and cybersecurity threats that attackers use to get inside your network and places it on the attacker’s advanced techniques.
Whether the initial network entry point is a mobile device or a static machine, the Deceptions Everywhere® approach protects your servers from harm.
Are you a mobile security expert? Take the quiz and find out >>
Recommended for you: