Smartphone Security Gaps Exposed - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Vulnerability-2 Next


There has been a dramatic increase in phone phishing attacks, both in voice calls (vishing) and in text messages (smishing). These attacks usually start with a prerecorded message alerting users to a potential breach of their account information, with a prompt to call and verify their account information. Credit card fraud appears to be the primary topic of the attacks, with credit unions being the businesses most hurt. 

Also see: Smartphones that Work for Business

As the number of smartphones capable of accessing enterprise resources increases, it’s important to remember that smartphones operate more like a computer than a phone.  Smartphones work so well as a portable office because they have the capability to browse the Internet.  That capability means your employees are at risk for viruses and other security breaches, so IT staff need to be just as vigilant with company-issued phones accessing the network as they are with computers.

We’ve put together this list of vulnerabilities inherent in the current generation of mobile devices, and then outlined the elements necessary to patch those security gaps.

The IT Business Edge Knowledge Network also provides several resources for establishing guidelines for mobile device use within the enterprise.

More Slideshows:

Five Ways to Protect Your Organization Against Social Engineering
Reduce your risk of a socially engineered attack through strictly enforced policies and procedures, training, and testing.

Smartphones that Work for Business

Not surprisingly, Research in Motion was the big winner of our informal poll of analysts. All but one of the analysts chose at least one BlackBerry device.

11 Work-Related iPad Apps Worth a Look

The sexy Apple tablet already has a growing fleet of business software on the market.


Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

More Slideshows

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

IT_Man85-290x195 Business in the Front, Balance All Around: Working with Gen Z

In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. ...  More >>

mobile92-290x195.jpg Why and How to Build an Enterprise App Store

Enterprise app stores provide a single "shopping experience" for employees and support both a BYOD model and a self-service IT model. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.