Overcoming Security Threats With Mobile Visibility

Half Of Enterprises Don’t Know How Many Mobile Security Incidents Occurred Last Year

Add bookmark

Steven Lerner

As a result of numerous vulnerabilities, mobile devices have become one of the primary targets of hackers. Although mobility leaders want to mitigate risks associated with device security, it is tough to do this when you lack basic visibility into the incidents.

Many Enterprises Lack Mobile Security Visibility

During the April 2019 Digital Transformation Online Summit, Netmotion’s Chris Edgmon (a solutions architect) conducted an important session about overcoming security threats with mobile visibility. Edgmon also displayed the results of a previous survey of mobility professionals, and the findings are troubling.

According to the survey results, over 48% of respondents didn’t know how many mobile security incidents occurred in the previous year within their organizations. Meanwhile, 32% of respondents had one to five security incidents recorded, and 7% had more than 21 incidents. Furthermore, 80% of attendees who saw the session live also didn’t know how many mobile security incidents actually occurred last year.

Mobile device security is one of the most pressing matters in the enterprise. The cost of a cyber security incident includes exposure to critical data, which can be especially destructive in sectors such as public safety and health care. There are also other consequences of a breach, including the lost of branding, the disruption in business, and a potential loss of customers. In fact, the average cost of a data breach is nearly $4 million.

Now that mobile devices contribute to the majority of global web traffic, there could potentially be more mobile breaches. Some of the top threats against mobile devices include data leakage, phishing, ransomware, spyware, and network spoofing. In particular, mobile phishing is on the rise in the past year.

See Related: Nation-State Security Trends Report 2019

How To Mitigate Mobile Security Risk

The secret to mitigating the risk of a mobile data breach is for enterprises to gain visibility in user’s devices, apps, and network access. After all, it is important to know where your data is going. However, this lack of visibility, especially in real-time, seems to be a widespread concern.

During Edgmon’s session at the Digital Transformation Online Summit, attendees were asked if they could easily identify devices or applications that are sending/receiving data to undesirable/unwanted server locations. Half of attendees said that they couldn’t do this, and 25% said that they didn’t know. In fact, only 16% said that they could identify devices and applications in real time.

“There’s not a lot of visibility, especially in real time, to how these devices are performing in the field,” said Edgmon.

Often at times, enterprises will be satisfied with only using two factor authentication as a way to limit security breaches. However, many advanced hackers could easily bypass two factor authentication. Although this solution should be leveraged, it is not enough to prevent all security incidents.

“Some verticals we see require it, like public safety or health care, but you need more than just two factor authentication,” said Edgmon.

One of the growing tools to protect mobile devices is the use of biometrics. This solution restricts access to mobile devices only to authorized users. This includes facial recognition, fingerprint recognition, voice recognition, and iris recognition. Biometric technology increases accountability, provide more user convenience, and offers a higher ROI.

During the session, Edgmon discussed several important capabilities for mobile device security, including keeping infected users off the network, blocking traffic by specifying a host/domain, organizing users into groups, and leveraging an operational intelligence platform.

Want to learn more about overcoming security threats with mobile visibility? Click here to watch the entire session on-demand from the Digital Transformation Online Summit.