TelecomTV TelecomTV
  • News
  • Videos
  • Channels
  • Events
  • Network Partners
  • Industry Insights
  • Directory
  • Newsletters
  • Digital Platforms and Services
  • Open RAN
  • Cloud Native Telco
  • Telcos and Public Cloud
  • The Green Network
  • Private Networks
  • Open Telco Infra
  • 5G Evolution
  • Access Evolution
  • Edgenomics
  • Network Automation
  • 6G Research and Innovation
  • Security
  • More Topics
  • Network Partners
  • Industry Insights
  • Directory
  • Newsletters
  • |
  • About
  • Contact
  • |
  • Connect with us
  • Digital Platforms and Services
  • Open RAN
  • Cloud Native Telco
  • Telcos and Public Cloud
  • The Green Network
  • Private Networks
  • Open Telco Infra
  • 5G Evolution
  • Access Evolution
  • Edgenomics
  • Network Automation
  • 6G Research & Innovation
  • Security
  • Connect with TelecomTV
  • About
  • Privacy
  • Help
  • Contact
  • Sign In Register Subscribe
    • Subscribe
    • Sign In
    • Register
  • Search

Industry Announcements

Tracker

Mobile Security Threats and Trends 2015

Via Gartner Newsroom

Sep 10, 2015

Egham, UK, September 10, 2015 View All Press Releases

Ahead of the Gartner Security & Risk Management Summit 2015, September 14-15 in London, U.K., we asked Dionisio Zumerle, research director at Gartner, to share his insight into the mobile security enterprise landscape in 2015, including the key threats and trends.

Q: What is the threat that creates the highest mobile risk for businesses?

A: The reality is that the threats targeting mobile devices have not changed. There are still two main causes of data loss on mobile devices: physical device loss and misuse of apps.

What has changed is the severity of the consequences. Mobile devices are now storing and accessing more-sensitive data. In healthcare, for example, an increasing number of physicians are using tablets to process sensitive data about their patients. In finance, brokers are using their smartphones to exchange sensitive information. In these scenarios, a device that falls in the wrong hands and does not have adequate protection can be the source of a major data breach.

As for users' misuse of apps, the problem is that the majority of apps are invasive. Many ask for permission to access the user's contact list, personal information and location. In addition, many employees use personal file sharing apps with corporate documents. Few of these apps are truly malicious, but the vast majority do not offer enterprise-grade security and are frequently the subject of credential leaks and other security incidents. This "bad hygiene" results in a multitude of enterprise data breaches, most of which go unreported.

Q: As threats get more advanced on mobile devices, how will mobile operating systems (OSs) provide better security?

A: If you have a speed limit of 120 km/h and you use three cars that can reach 150, 180 and 220 km/h, all three cars will take you from A to B. There will be preferences, there will be more convenient solutions, but the basics will be covered in the three cases.

We have a similar situation today regarding inherent security mechanisms across the mobile OS spectrum. While there are some security differences between mobile OSs, the basic security features such as integrity protection, encryption, app isolation and kernel protection are covered by all four main OSs.

What differentiates mobile security for enterprises is OS manageability and updates. IT leaders and CISOs need to ensure that they can granularly and consistently manage mobile devices, and have assurance from the device and/or OS vendor that there will be fast security updates for the lifetime of the devices.

Q: Too many organizations focus on protecting against malware. Are there other areas they should put emphasis on?

  • A: * Mobile devices are seeing a rapid growth in malware attacks. Frequently used techniques are repackaging legitimate apps into malicious ones and apps that act as a man-in-the-mobile. However, those attacks are specifically targeting consumer apps that have transactional value.

In the last few months we have also witnessed the development of mobile attacks that can be applied across the enterprise, are more realistic, can be exploited remotely and can do greater damage. However, we have yet to see these attacks translate into actual damages for organizations.

IT leaders and CISOs should take some basic precautions to minimize the risks of mobile malware:

  • Require basic enterprise security policies. Define device passcodes including length and complexity as well as retry and timeout standards.
  • Specify the minimum and maximum versions allowed of platforms and OSs. Disallow models that cannot be updated or supported.
  • Ban jailbreaking and rooting, and restrict the use of unapproved third-party app stores. Require apps to be signed.

Organizations' emphasis should remain on preventing data leakage through physical loss or leaky apps.

Mr. Zumerle will further discuss security and privacy aspects for mobile devices at the Gartner Security & Risk Management Summit 2015, September 14-15 in London, U.K.

Related Topics
  • 6G Research and Innovation,
  • Device Software & Apps,
  • Devices,
  • Digital Platforms and Services,
  • Enterprise,
  • Gartner,
  • Healthcare,
  • Mobile,
  • News,
  • North America,
  • Research and Trials,
  • Security,
  • Tracker

More Like This

Digital Platforms and Services

Leading brewery AB InBev optimizes infrastructure in Europe with Orange Business to further its digital business goals

Mar 21, 2023

Digital Platforms and Services

Gamma announces strong results for 2022

Mar 21, 2023

Access Evolution

Project Gigabit contract award unlocks 215,000 home expansion of CityFibre’s networks across Cambridgeshire

Mar 21, 2023

Access Evolution

Eir announces results for full year and fourth quarter 2022

Mar 21, 2023

Digital Platforms and Services

Hewlett Packard Enterprise to acquire OpsRamp

Mar 21, 2023

This content extract was originally sourced from an external website (Gartner Newsroom) and is the copyright of the external website owner. TelecomTV is not responsible for the content of external websites. Legal Notices

Email Newsletters

Stay up to date with the latest industry developments: sign up to receive TelecomTV's top news and videos plus exclusive subscriber-only content direct to your inbox – including our daily news briefing and weekly wrap.

Subscribe

Top Picks

Highlights of our content from across TelecomTV today

10:43

MWC23 interview: Mari-Noëlle Jégo-Laveissière, deputy CEO of Orange

12:45

MWC23 interview: Abdu Mudesir, Group CTO, Deutsche Telekom

9:26

MWC23 interview: Greg McCall, Chief Networks Officer, BT

TelecomTV
Company
  • About Us
  • Media Kit
  • Contact Us
Our Brands
  • DSP Leaders World Forum
  • Great Telco Debate
  • TelecomTV Events
Get In Touch
[email protected]
+44 (0) 207 448 1070
Connect With Us

  • Privacy
  • Cookies
  • Terms of Use
  • Legal Notices
  • Help

TelecomTV is produced by the team at Decisive Media.

© Decisive Media Limited 2023. All rights reserved. All brands and products are the trademarks of their respective holder(s).