SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
MOBILE

SECURITY
RISKS
Presented by:
Click this button to tweet the
information on each slide.
MOBILE PHONE USERS ARE AT LEAST

3X MORE LIKELY
TO BECOME VICTIMS OF PHISHING
ATTACKS THAN DESKTOP USERS.

15% of us store

sensitive financial
information on
our devices

Show as a List

40%

of smartphone
users enter
passwords into
their phones at
least once a day.
35%

of U.S. adults have
had a mobile device

STOLEN OR LOST
Yet, 2/3 of people DON’T USE
MOBILE SECURITY APPLICATIONS
that could help them protect data
when someone else has the device.

0
01 0
1 00 1
0 01 0
01 00
1 00 1
01 1 0
1 1 01
1 01 1
0 01 0
01 00
1 1 01
1 01 1
01 1 0
1 00 1
01 1 0
1 01
1

69%

of those surveyed

DO NOT BACK UP
THEIR PHONE DATA

64%

of those surveyed

DO NOT USE A
SCREEN LOCK OR
PASSWORD TO
ACCESS THEIR DEVICE

Although 73% of us are aware of the increased security
risk of public WiFi, 66% still connect to public networks

Show as a List
Consumers who used mobile
banking in 2012 by age
60+

USING A MOBILE PHONE IN
THE PAST 12 MONTHS...

87%

have checked an account
balance or recent transaction

18-29

45-59

53%

have transferred money
between two accounts

30-44

27%

SMARTPHONES USED
FOR BANKING
2011
2012

made a bill payment

21%

42%
48%

deposited a check using a
mobile phone camera

Show as a List
Learn How to Secure
Your Business

Sources:
https://blogs.rsa.com/rogue-mobile-apps-phishing-malware-and-fraud/
http://blogs.denverpost.com/techknowbytes/2013/02/27/varied-knowledge-of-mobile-security-means-many-users-are-at-risk/8591/
PRweb.com | http://blogs.denverpost.com/techknowbytes/2013/02/27/varied-knowledge-of-mobile-security-means-many-users-are-at-risk/8591/
http://www.cettatech.com/blog/top-5-mobile-security-mistakes/
http://www.bostonglobe.com/business/2013/07/13/mobile-apps-gain-popularity-banks-try-keep/qshfqhvKts7DlGZfAoF76K/story.html
https://spideroak.com/privacypost/cloud-security/how-secure-are-mobile-banking-apps/ | http://news.medill.northwestern.edu/chicago/news.aspx?id=221517

Mais conteúdo relacionado

Mais procurados

Mobile security
Mobile securityMobile security
Mobile security
home
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
rebelreg
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056
mashiur
 

Mais procurados (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Mobile security
Mobile securityMobile security
Mobile security
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Mobile Security Research Projects Help
Mobile Security  Research Projects HelpMobile Security  Research Projects Help
Mobile Security Research Projects Help
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 

Semelhante a Why Your Mobile Device Isn’t As Secure As You Think

TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
Peggy Lawless
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
Malasta Hill
 
Security survey market insights
Security survey market insightsSecurity survey market insights
Security survey market insights
tyntec
 

Semelhante a Why Your Mobile Device Isn’t As Secure As You Think (20)

TeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINALTeleSign Consumer Account Security Report 2015 FINAL
TeleSign Consumer Account Security Report 2015 FINAL
 
Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013Norton Cyber Crime Report 2013
Norton Cyber Crime Report 2013
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacion
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Mobile infographic 2015_english
Mobile infographic 2015_englishMobile infographic 2015_english
Mobile infographic 2015_english
 
Deloitte Mobile Consumer Survey 2014 Report
Deloitte Mobile Consumer Survey 2014 ReportDeloitte Mobile Consumer Survey 2014 Report
Deloitte Mobile Consumer Survey 2014 Report
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Bank of America 2015 Consumer Mobility Report
Bank of America 2015 Consumer Mobility Report Bank of America 2015 Consumer Mobility Report
Bank of America 2015 Consumer Mobility Report
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
Cybercrime - View and perceptions from EU citizens
Cybercrime - View and perceptions from EU citizensCybercrime - View and perceptions from EU citizens
Cybercrime - View and perceptions from EU citizens
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
Security survey market insights
Security survey market insightsSecurity survey market insights
Security survey market insights
 
Cell Internet Use 2013, PewResearch
Cell Internet Use 2013, PewResearchCell Internet Use 2013, PewResearch
Cell Internet Use 2013, PewResearch
 

Mais de Blue Coat

Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Blue Coat
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus Network
Blue Coat
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
Blue Coat
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
Blue Coat
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
Blue Coat
 

Mais de Blue Coat (13)

Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 
What is Heartbleed?
What is Heartbleed?What is Heartbleed?
What is Heartbleed?
 
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
 
Empowering the Campus Network
Empowering the Campus NetworkEmpowering the Campus Network
Empowering the Campus Network
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
 
How To Catch A Hidden Spammer
How To Catch A Hidden SpammerHow To Catch A Hidden Spammer
How To Catch A Hidden Spammer
 

Último

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Why Your Mobile Device Isn’t As Secure As You Think

  • 3. Click this button to tweet the information on each slide.
  • 4. MOBILE PHONE USERS ARE AT LEAST 3X MORE LIKELY TO BECOME VICTIMS OF PHISHING ATTACKS THAN DESKTOP USERS. 15% of us store sensitive financial information on our devices Show as a List 40% of smartphone users enter passwords into their phones at least once a day.
  • 5. 35% of U.S. adults have had a mobile device STOLEN OR LOST Yet, 2/3 of people DON’T USE MOBILE SECURITY APPLICATIONS that could help them protect data when someone else has the device. 0 01 0 1 00 1 0 01 0 01 00 1 00 1 01 1 0 1 1 01 1 01 1 0 01 0 01 00 1 1 01 1 01 1 01 1 0 1 00 1 01 1 0 1 01 1 69% of those surveyed DO NOT BACK UP THEIR PHONE DATA 64% of those surveyed DO NOT USE A SCREEN LOCK OR PASSWORD TO ACCESS THEIR DEVICE Although 73% of us are aware of the increased security risk of public WiFi, 66% still connect to public networks Show as a List
  • 6. Consumers who used mobile banking in 2012 by age 60+ USING A MOBILE PHONE IN THE PAST 12 MONTHS... 87% have checked an account balance or recent transaction 18-29 45-59 53% have transferred money between two accounts 30-44 27% SMARTPHONES USED FOR BANKING 2011 2012 made a bill payment 21% 42% 48% deposited a check using a mobile phone camera Show as a List
  • 7. Learn How to Secure Your Business Sources: https://blogs.rsa.com/rogue-mobile-apps-phishing-malware-and-fraud/ http://blogs.denverpost.com/techknowbytes/2013/02/27/varied-knowledge-of-mobile-security-means-many-users-are-at-risk/8591/ PRweb.com | http://blogs.denverpost.com/techknowbytes/2013/02/27/varied-knowledge-of-mobile-security-means-many-users-are-at-risk/8591/ http://www.cettatech.com/blog/top-5-mobile-security-mistakes/ http://www.bostonglobe.com/business/2013/07/13/mobile-apps-gain-popularity-banks-try-keep/qshfqhvKts7DlGZfAoF76K/story.html https://spideroak.com/privacypost/cloud-security/how-secure-are-mobile-banking-apps/ | http://news.medill.northwestern.edu/chicago/news.aspx?id=221517