By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Lost devices and malware top list of mobile security threats
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Mobile > Cellphones > Lost devices and malware top list of mobile security threats
CellphonesEnterpriseInternetMobile

Lost devices and malware top list of mobile security threats

Aaron Tan
Last updated: June 13, 2014 at 5:04 PM
Aaron Tan
Published: October 7, 2012
3 Min Read
SHARE

 

Data loss from lost, stolen or decommissioned devices and mobile malware have come out tops in a mobile security survey that was recently concluded by the Cloud Security Alliance (CSA).

Conducted by the CSA’s mobile working group, the survey involving over 200 enterprise respondents from 26 countries serves as an important step in a larger effort to guide enterprises on what to focus on to address mobile security threats.

John Yeoh, research analyst at CSA, said: “Personally owned mobile devices are increasingly being used to access employers’ systems and cloud-hosted data, both via browser-based and native mobile applications. This without a doubt is a tremendous concern for enterprises worldwide”.

“The results of this research will play an important role as we set out to develop much needed guidance on where time, talent and money should be placed when it comes to addressing mobile security threats,” he added.

Patrick Harding, chief technology officer of Ping Identity, a cloud identity security firm, noted that the results of the CSA survey are testament to the security threats that mobile devices introduce to corporate networks.

“With more and more enterprises adopting a BYOD model, it is critical that mobile devices adhere to the same corporate security policies as other devices and that proper identity and access management processes are put in place to ensure the security and integrity of the organisation.”

Besides highlighting the top mobile security threats, 64 percent of respondents believe that NFC and proximity-based hacking will happen as early as next year. In addition, 81 percent of respondents believe that insecure Wi-Fi and rogue access points are already happening today.

“This is of particular concern as the proliferation of mobile devices consequently increases the use of and reliance on Wi-Fi networks,” CSA said in a statement last week.

Dan Hubbard, CTO of OpenDNS, an Internet security company, added that as “we move further into an era where mobile computing is ubiquitous, we’re seeing an entirely new threat landscape that involves newer concerns like lost devices and rogue marketplaces, but also a heightened level of concern over insecure public Wi-Fi as we rely more and more on access as we travel.”

Top Mobile Threats
1. Data loss from lost, stolen or decommissioned devices
2. Information-stealing mobile malware
3. Data loss and data leakage through poorly written third-party applications
4. Vulnerabilities within devices, OS, design and third-party applications.
5. Insecure WiFi, network access and rogue access points
6. Insecure or rogue marketplaces
7. Insufficient management tools, capabilities and access to APIs (includes personas)
8. NFC and proximity-based hacking

Singapore businesses lose over US$1 billion from data loss and downtime
Google Pixel 2 XL gets hardly any discount for basic Singtel plan
Most free security apps do not guard against Android malware
Goondu review: Nokia Lumia 800
Dell acquires backup software specialist AppAssure

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Previous Article Geek buy: Powercolor AMD HD7970
Next Article Guild Wars 2: 10 reasons why you should play it
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Fujifilm GFX100RF review: Fun medium-format street photography camera
Imaging
May 14, 2025
Looks over AI? Samsung pitches slimmed-down Galaxy S25 Edge
Cellphones Mobile
May 13, 2025
Stunning AI advancements could transform healthcare, education and agriculture globally: Bill Gates
Internet
May 7, 2025
NRF 2025 APAC show in Singapore to spotlight latest in retail innovation
Enterprise
May 7, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?