SHARE
Facebook X Pinterest WhatsApp

Mobile Security 2015: The Enterprise at Risk

As we prepare for a new year, we often look at the things we have learned from the current year. 2014 may very well become known as the year of the data breach (that is, unless 2015 is bigger). From JPMorgan Chase to Target to Jimmy Johns to the most recent Sony hack, 2014 was the year that the state of data security […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Dec 16, 2014

As we prepare for a new year, we often look at the things we have learned from the current year. 2014 may very well become known as the year of the data breach (that is, unless 2015 is bigger). From JPMorgan Chase to Target to Jimmy Johns to the most recent Sony hack, 2014 was the year that the state of data security was compromised. 

While hackers have many points of entry – point-of-sale devices, phishing emails, malware, etc. – the long reach of mobile to mission-critical apps and data has exponentially increased the potential for a breach. According to Check Point Software Technologies, 47 percent of organizations have experienced a security breach as a result of a compromised mobile device, and Symantec estimates the average cost of a mobile incident at a staggering $429,000. In 2015, the situation will only get worse.

In this slideshow, Bluebox Security, a mobile data security company, has provided key stats from the year in mobile security, including major vulnerabilities, mobile security, spending and user behavior.

Mobile Security 2015: The Enterprise at Risk - slide 1

Mobile’s Wild West

Click through for a closer look at mobile security and the risk it poses to the enterprise, as identified by Bluebox Security.

Mobile Security 2015: The Enterprise at Risk - slide 2

Basic Security Failures

According to Gartner’s “Predictions 2014: Mobile Security Won’t Just Be About the Device,” 75 percent of mobile apps will fail basic security tests in 2015.

Mobile Security 2015: The Enterprise at Risk - slide 3

How Secure Are Your Mobile Apps?

Well, 75 percent don’t use proper encryption when storing data on a mobile device, 97 percent have access to private data without appropriate security measures, and 75 percent of mobile security breaches will be the result of exploiting poorly developed apps.

Mobile Security 2015: The Enterprise at Risk - slide 4

User Behavior

User behavior is a major cause for concern, and IT pros know it. According to a Check Point survey, 87 percent of IT pros worry about careless employees. Is it any surprise when mobile users in the U.S. lose an average of 113 smartphones per minute – yes, minute, download an average of 26 apps from the cloud, and 34 percent take no security measures whatsoever?

Mobile Security 2015: The Enterprise at Risk - slide 5

Protected OS? Think Again

Think Apple is safer? According to a Bluebox mobile vulnerabilities report, in 2014 Apple outpaced Android vulnerabilities by a wide margin.

Mobile Security 2015: The Enterprise at Risk - slide 6

Mobile Attacks on the Rise

Mobile attacks continue to rise. This year alone, mobile users have faced major threats from Heartbleed, Towel Root, Fake ID and Masque Attack. It’s critical to ensure mobile data is protected and that proactive action is taken when threats emerge.

Recommended for you...

Is 5G Enough to Boost the Metaverse?
Litton Power
Apr 18, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
Best Enterprise 5G Network Providers 2022
5G Cybersecurity Risks and How to Address Them
Kihara Kimachia
Dec 17, 2021
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.