Bonus $100
Fury vs Usyk
IPL 2024
Lucknow Super Giants vs Mumbai Indians
Paris 2024 Olympics
PROMO CODES 2024
UEFA Euro 2024
Users' Choice
88
87
85
69

Mobility is a company's top vulnerability

24 Aug 2015
00:00
Read More

Mobile devices are the weak links in the security chain, providing easier direct access to more valuable organizational assets than any other intrusion point, research shows.

Check Point Software Technologies Ltd’s 2015 Security Report reveals the prevalence and growth of threats on enterprise networks.

The research found that for an organization with more than 2,000 devices on its network, there's a 50% chance that there are at least 6 infected or targeted mobile devices on their network.

A majority (72%) of IT providers polled for the research agreed that their top mobile security challenge is securing corporate information.

In addition two thirds said their second biggest challenge is managing personal devices storing both corporate and personal data. Corporate data is at risk, and being made aware of these risks is critical to taking the proper steps to secure mobile devices.

Corporations frequently rely on applications to help their business be more organized and streamlined. However, these applications become vulnerable points of entry for businesses. Some applications, such as file sharing, are obviously risky.

The rise of 'shadow IT', applications that aren't sponsored or supported by the central IT organization has led to even riskier business.

The research revealed that 96% of organizations studied used at least one high-risk application in 2014, a 10 point increase from the previous year. It also unveiled that 12.7 high-risk application events happen every hour.

.

Related content

Rating: 5
Advertising