Mobility is a company's top vulnerability

Networks Asia staff
24 Aug 2015
00:00

Mobile devices are the weak links in the security chain, providing easier direct access to more valuable organizational assets than any other intrusion point, research shows.

Check Point Software Technologies Ltd’s 2015 Security Report reveals the prevalence and growth of threats on enterprise networks.

The research found that for an organization with more than 2,000 devices on its network, there's a 50% chance that there are at least 6 infected or targeted mobile devices on their network.

A majority (72%) of IT providers polled for the research agreed that their top mobile security challenge is securing corporate information.

In addition two thirds said their second biggest challenge is managing personal devices storing both corporate and personal data. Corporate data is at risk, and being made aware of these risks is critical to taking the proper steps to secure mobile devices.

Corporations frequently rely on applications to help their business be more organized and streamlined. However, these applications become vulnerable points of entry for businesses. Some applications, such as file sharing, are obviously risky.

The rise of 'shadow IT', applications that aren't sponsored or supported by the central IT organization has led to even riskier business.

The research revealed that 96% of organizations studied used at least one high-risk application in 2014, a 10 point increase from the previous year. It also unveiled that 12.7 high-risk application events happen every hour.

Related content

Follow Telecom Asia Sport!
Comments
No Comments Yet! Be the first to share what you think!
This website uses cookies
This provides customers with a personalized experience and increases the efficiency of visiting the site, allowing us to provide the most efficient service. By using the website and accepting the terms of the policy, you consent to the use of cookies in accordance with the terms of this policy.