DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
View Events Video Library
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Integrating PostgreSQL Databases with ANF: Join this workshop to learn how to create a PostgreSQL server using Instaclustr’s managed service

Mobile Database Essentials: Assess data needs, storage requirements, and more when leveraging databases for cloud and edge applications.

Monitoring and Observability for LLMs: Datadog and Google Cloud discuss how to achieve optimal AI model performance.

Automated Testing: The latest on architecture, TDD, and the benefits of AI and low-code tools.

Related

  • Simple Privacy Tweaks: Fast and Effective Methods To Secure Your Personal Information
  • Top Strategies for Effective Mobile App Testing and Quality Assurance
  • Mobile App Development Trends and Best Practices
  • Essential Mobile App Security Tips for Coders in 2023: Make Your App Unhackable

Trending

  • Build a Serverless App Fast With Zipper: Write TypeScript, Offload Everything Else
  • The Convergence of Testing and Observability
  • GenAI-Infused ChatGPT: A Guide To Effective Prompt Engineering
  • Spring WebFlux Retries
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Six Shocking Facts about Enterprise Mobile Security and How to Avoid Them

Six Shocking Facts about Enterprise Mobile Security and How to Avoid Them

Security threats evolve alongside BYOD adoption: this how-to covers OS endpoints, device security, apps, stores, and cyber security strategy.

Josh Anderson user avatar by
Josh Anderson
·
Oct. 23, 15 · Tutorial
Like (3)
Save
Tweet
Share
3.88K Views

Join the DZone community and get the full member experience.

Join For Free

a lack of mobility in today’s market harms a business in many; not being mobile might lead it to miss out on consumer solutions or result in missed business opportunities. as a result, enterprise mobility has become a must-have for modern organizations, delivering many successes and opportunities.

here we'll highlight the few facts about enterprise mobile security which organizations who want to embrace enterprise mobility can use to avoid the associated threats.

mobile devices & threats

according to research by the enterprise strategy group , enterprise mobility technology spending plans for the next 12 months show an 18% increase in byod initiatives and a 19% increase in mobile applications deployment. for q3 2014, android os achieved a worldwide smartphone market share of over 84%, a remarkable increase from 17.2% in 2010. equally there has been a huge growth in android malware, with about 99% of all mobile malware detected by kaspersky lab in 2012 designed to attack android devices.

in 2014 alone, about 81% of organizations suffered a data loss incident and new malware increased by 71%; a clear message about cybercrime reaching a critical point. a 2015 global study by check point shows that 59% of organizations with a byod policy are faced with the problem of tracking/controlling access to corporate and private networks, while 46% are faced with the challenge of keeping device os and apps updated.

the changing mobile landscape

we want to highlight six areas where organizations can make more effort in managing exposure to the various security threats that come with enterprise mobility, becoming proactive in preventing vulnerability.

1. mobile endpoints

the current use of enterprise mobile endpoints for android (66%), apple (77%) and windows (33%) is set to significantly rise (by 20% for android, 10% for apple and 30% for windows). organizations can better manage their growing mobile device fleet by setting and maintaining security policies, protecting information on devices, and by applying authentication to both networks and applications.

2. device-level security

respondents of a ponemon mobile security survey indicated lax attitudes tomobile security. while 77% of people viewed mobile technology as essential and 76% thought mobile usage could negatively impact security, only 39% had mobile security measures in place. better identity and access management systems for tracking user account changes and the ability to establish patterns and define normal activity are some of the ways in which organizations can successfully mitigate the risk of device-level data breach.

3. mobile applications

with a basic security test fail rate of over 75% for mobile apps due to a number of factors ranging from lack ofproper encryption to the number of weekly attacks on mobile apps, it is no surprise that mobile device breaches are hitting companies very hard. organizations must first educate their employees about the risks associated with mobile applications, then standardize on trusted enterprise-grade applications, implement category-based applications management processes and encrypt documents to prevent data loss.

4. cyber security strategy

according to cisco’s 2015 annual security report, acyber security benchmark showed that while 90% of respondents were confident in their security capabilities, a full 60% were not patching software and systems. organizations must build on the following security principles: security must support the business, work with existing architecture and be usable, be transparent and informative, enable visibility and appropriate action and, finally, must be viewed as a people problem.

5. app stores & developers

mobile apps can easily copy personal details, gps coordinates or details of all apps installed on a device andupload them. organizations now face high-riskapplication events as many as 305 times per day - up 88% from last year’s rate of 162 times per day - as a direct consequence of downloaded apps. organizations therefore need to implement a software-defined protection architecture and combine os and cpu level sandboxing with threat extraction technologies to mitigate against fast-evolving attacks from app store and/or developer vulnerabilities.

6. wipe data

ibm’smaas360 analytics gathered from global it organizations indicate that on average, 450 devices get wiped in a day, with 51% using manual wipe and only 37% doing a full wipe. improved containerization capabilities are essential for organizations to be able to isolate work data, making it easier to perform selective wipes or even repurpose a device previously used by another employee.

secure the future

organizations must be future minded, setting clear long term objectives on how to optimize security infrastructure, tools and technologies in order to be prepared for the ever increasing vulnerabilities and threats resulting from the changing mobile landscape. by understanding both potential and unknown cyber security threats, utilizing the expertise of information security professionals and creating solid plans that align with your business, you can turn security into an enabler and fully reap the benefits of the mobile enterprise.

have you already tried infragistics shareplus , our native mobile sharepoint solution? shareplus is amazingly easy to adopt and loved by users working with sharepoint on the go. sign up for a shareplus enterprise demo today.

mobile app security

Published at DZone with permission of Josh Anderson, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • Simple Privacy Tweaks: Fast and Effective Methods To Secure Your Personal Information
  • Top Strategies for Effective Mobile App Testing and Quality Assurance
  • Mobile App Development Trends and Best Practices
  • Essential Mobile App Security Tips for Coders in 2023: Make Your App Unhackable

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: