Security Vulnerabilities at All-time Highs for Mobile Devices

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13
Previous Next

Click through for recommendations on dealing with mobile device security vulnerabilities, as identified by Juniper Networks.

In a global mobile threat study released recently, Juniper Networks (NYSE: JNPR) found that enterprise and consumer mobile devices are exposed to a record number of security threats, including a 400 percent increase in Android malware, as well as highly targeted Wi-Fi attacks. Through close examination of recent malware exploits, the study outlines new areas of concern and delivers clear recommendations on essential security technologies and practices to help consumers, enterprises/SMBs, and government entities guard against mobile device exploits.

With smartphones set to eclipse PCs as the preferred method of both personal and professional computing, cyber criminals have turned their attention to mobile devices. At the same time, the gap between hacker capabilities and an organization's defenses is widening. These trends underscore the need for further mobile security awareness, as well as more stringent, better integrated mobile security policies and solutions.

"The last 18 months have produced a non-stop barrage of newsworthy threat events, and while most had been aimed at traditional desktop computers, hackers are now setting their sights on mobile devices. Operating system consolidation and the massive and growing installed base of powerful mobile devices is tempting profit-motivated hackers to target these devices," said Jeff Wilson, principle analyst, Security at Infonetics Research. "In a recent survey of large businesses, we found that nearly 40 percent considered smartphones the device type posing the largest security threat now. Businesses need security tools that provide comprehensive protection: from the core of the network to the diverse range of endpoints that all IT shops are now forced to manage and secure."

In order to guard against growing mobile malware threats, the report recommends the following security measures.

 

Related Topics : GPS, GSM, Master Data Management

 

More Slideshows

BarcodingVoiceDataPlans0x Five Considerations When Selecting Voice and Data Plans for Business

With hundreds of mobile plan options on the market, deciding which voice and data plan is most suitable for your business can be a huge challenge. ...  More >>

WatchitooPocketOffice0x Why the Mobile 'Pocket Office' Is Inevitable and Good for Business

The time is ripe for businesses to harness the mobile tide and use it to empower productivity, rather than fight the current. ...  More >>

mobile25-190x128 Seven Steps to Prepare for BYOD

By all measures, BYOD is here to stay and the focus has shifted from trying to restrict BYOD to learning how to leverage BYOD as a business enabler while managing its risks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.