Security Vulnerabilities at All-time Highs for Mobile Devices - Slide 8

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13
Next Recommendations for Business and Government-8 Next

Recommendations for Business and Government

Use SSL VPN clients to effortlessly protect data in transit and ensure appropriate network authentication and access rights.

In a global mobile threat study released recently, Juniper Networks (NYSE: JNPR) found that enterprise and consumer mobile devices are exposed to a record number of security threats, including a 400 percent increase in Android malware, as well as highly targeted Wi-Fi attacks. Through close examination of recent malware exploits, the study outlines new areas of concern and delivers clear recommendations on essential security technologies and practices to help consumers, enterprises/SMBs, and government entities guard against mobile device exploits.

With smartphones set to eclipse PCs as the preferred method of both personal and professional computing, cyber criminals have turned their attention to mobile devices. At the same time, the gap between hacker capabilities and an organization's defenses is widening. These trends underscore the need for further mobile security awareness, as well as more stringent, better integrated mobile security policies and solutions.

"The last 18 months have produced a non-stop barrage of newsworthy threat events, and while most had been aimed at traditional desktop computers, hackers are now setting their sights on mobile devices. Operating system consolidation and the massive and growing installed base of powerful mobile devices is tempting profit-motivated hackers to target these devices," said Jeff Wilson, principle analyst, Security at Infonetics Research. "In a recent survey of large businesses, we found that nearly 40 percent considered smartphones the device type posing the largest security threat now. Businesses need security tools that provide comprehensive protection: from the core of the network to the diverse range of endpoints that all IT shops are now forced to manage and secure."

In order to guard against growing mobile malware threats, the report recommends the following security measures.

More Slideshows:


Salary Negotiations: Insider Secrets Recruiter reveals insider's secrets to getting paid what you want.

Eight FREE BlackBerry Productivity Apps Top-rated free apps from the BlackBerry App World.


Ten Cool Gadgets When You're on the Go Hot new gadgets to add to your collection.

 

Related Topics : GPS, GSM, Master Data Management

 
More Slideshows

mobile84-290x195 Enterprise Mobility Management Myth Busters: Users vs. IT Reality

We see time and time again, with things like shadow IT, that users don't always have the same level of appreciation for or understanding of why we need device management tools. ...  More >>

mobile83-290x195 10 Myths About Virtual Mobile Infrastructure

Knowing that enterprise mobility users are overwhelmingly dissatisfied, let's examine the myths that might deter organizations from trying VMI. ...  More >>

Wearables6-290x195 5 Business Operations Transformed by Wearables

Mobile has revolutionized business and now wearables and intelligent automation are furthering a redesign of interactivity among employees, assets, tools and customers. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.