dcsimg

Mobile Security 2015: The Enterprise at Risk

  • Mobile Security 2015: The Enterprise at Risk-

    Protected OS? Think Again

    Think Apple is safer? According to a Bluebox mobile vulnerabilities report, in 2014 Apple outpaced Android vulnerabilities by a wide margin.

1 | 2 | 3 | 4 | 5 | 6 | 7

Mobile Security 2015: The Enterprise at Risk

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • Mobile Security 2015: The Enterprise at Risk-5

    Protected OS? Think Again

    Think Apple is safer? According to a Bluebox mobile vulnerabilities report, in 2014 Apple outpaced Android vulnerabilities by a wide margin.

As we prepare for a new year, we often look at the things we have learned from the current year. 2014 may very well become known as the year of the data breach (that is, unless 2015 is bigger). From JPMorgan Chase to Target to Jimmy Johns to the most recent Sony hack, 2014 was the year that the state of data security was compromised. 

While hackers have many points of entry – point-of-sale devices, phishing emails, malware, etc. - the long reach of mobile to mission-critical apps and data has exponentially increased the potential for a breach. According to Check Point Software Technologies, 47 percent of organizations have experienced a security breach as a result of a compromised mobile device, and Symantec estimates the average cost of a mobile incident at a staggering $429,000. In 2015, the situation will only get worse.

In this slideshow, Bluebox Security, a mobile data security company, has provided key stats from the year in mobile security, including major vulnerabilities, mobile security, spending and user behavior.