SlideShare uma empresa Scribd logo
1 de 15
Top 2016 Mobile Security
Threats and Your Employees
HOW YOUR EMPLOYEES EXPOSE YOU TO THE TOP MOBILE SECURITY THREATS OF 2016
Most people believe smartphones are
secure when they buy them
❖ 45% of people don’t buy security software for their smartphones
❖ They don’t even bother to use a simple password to secure their
phone
❖ It only takes 30 seconds to hack into a smartphone
❖ 78% of iOS and Android apps have been hacked
❖ 50% of popular apps don’t defend against hackers
❖ And wiping them after
they are lost doesn’t
always keep data out
of hackers’ hands
Over 4 million
smartphones
were lost in
2013 alone
Grayware and Bloatware
These are intrusive applications that have been known to:
❖ Leak information
❖ Change user bookmarks
❖ Pester users to download other programs
❖ Install ads for other programs on a user’s home screen
❖ Sent SMS messages or communicate externally without the user’s
knowledge
Many smartphones that are preloaded with apps often contain
grayware and bloatware.
Malvertising
❖ a term used to
describe ads that
contain Trojans / other
malicious software
aimed at being
embedded in one
phone and then
spreading.
❖ Malvertising has
become a popular way
for hackers to infiltrate
smartphones, putting
your corporate network
at risk.
Free Wi-Fi
Improper session handling,
unintended data leakage,
poor authorization and
authentication, and lack of
binary protections are
vulnerabilities that can often
be exploited when using
unsecured Wi-Fi access
Employees as Internal threats
❖ By the end of 2018, it is
expected that over 25% of
corporate data will be
transmitted between mobile
devices and a cloud server
while bypassing any perimeter
security.
❖ Disgruntled employees have
always been a threat to
organizations and their
intellectual data. Mobile
devices offer the ability for
individuals to bypass many
standard security measures in
their attempt to extricate and
transmit company information.
Top 6 Mobile Threats
❖ Cross Device Transactions
❖ Expanding Mobile Payment Options
❖ Mobile Web Browser Hacking
❖ Man-in-the-middle(MITM)Attacks
❖ Distributed Denial of Service (DDoS)Attacks
❖ Mobile Healthcare Information and Devices
Cross Device Transactions
❖ An individual may access their
work email, eBay account or
mobile banking services from
different devices, sometimes
even on the same day.
❖ Mobile security for this type of
access is often unsuccessful
and leaves both the company
and clients vulnerable to
malicious attacks.
Expanding
Mobile Payments
▶ NFC-based mobile
payments are
vulnerable to bot
attacks, malware,
device spoofing,
jailbroken devices or
even rooting.
▶ Whether you offer
mobile payment
options or your
employees use them
for their purchases,
your company can be
at risk as a result of
this vulnerability.
Mobile Web Browser Hacking
❖ Webkit-based exploits coupled with OS/kernel-level exploits can
bypass a browser sandbox and then leverage OS vulnerabilities.
❖ Stagefright has been giving Android and Android-based app
programmers a run for their money as security experts try in vain to
create effective security patches.
❖ This makes mobile web browser hacking most effective way to
bypass smartphone system level security measures
Man-in-the-Middle-
Attacks(MITM)
❖ MITM attacks have also
increased as more people are
using free Wi-Fi for tablets,
smartphones and laptops.
❖ Eavesdropping and hijacking
are easier using these open
Internet access points and if an
employee is using them to
access company data, the
hacker will have an all access
pass into your corporate
network.
Distributed Denial of Service Attacks
(DDoS)
❖ DDoS attacks have become more sophisticated as hackers learn
new ways to leverage old school attacks.
❖ Malevolent programmers have learned how to turn devices into
DDoS bots once the hacker has gained control of them.
❖ These DDoS bots are harder to detect or prevent compared to
traditional attacks, making corporations vulnerable to a threat they
aren’t aware exists.
Mobile Healthcare Information and Devices
Your Employees and Health Information
❖ Mobile Healthcare Information and
devices have become more of a
threat as the healthcare industry
struggles to make devices more
intelligent and data more accessible.
❖ Surveys show that 94% of healthcare
organizations admit to a cyber-attack
❖ When your employees access their
medical information from a hacked
organization that health care system
may be monitored by hackers and
used to access the devices that
connect to the system via an internet
connection.
Do you want to learn more or find a
solution ?
You can learn more about how employees are a threat to your
company’s mobile security by reading the full article here.
If you want to learn more about advanced mobile security threats and
how to protect your organisation, click here , comment in the boxes
below or email neil.kemp@networkandsecurity.co.uk

Mais conteúdo relacionado

Mais procurados

IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM Security
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadIBM Security
 
Security Trends in the Retail Industry
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail IndustryIBM Security
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainIBM Security
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsIBM Security
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyIBM Security
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?IBM Security
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationIBM Security
 

Mais procurados (20)

IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 
Security Trends in the Retail Industry
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail Industry
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Attack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack ChainAttack Autopsy: A Study of the Dynamic Attack Chain
Attack Autopsy: A Study of the Dynamic Attack Chain
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 

Semelhante a Top 2016 Mobile Security Threats and your Employees

CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfkostikjaylonshaewe47
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesrebelreg
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionNagarro
 
Malware Applications Development.pptx
Malware Applications Development.pptxMalware Applications Development.pptx
Malware Applications Development.pptxFullstackSRM
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Fusion Informatics
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfGMATechnologies1
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Mverve1
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfMverve1
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Introduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxIntroduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxsomi12
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxCabdullhiY
 
Improving Cybersecurity Awareness In Advanced Payment Systems
Improving Cybersecurity Awareness In Advanced Payment SystemsImproving Cybersecurity Awareness In Advanced Payment Systems
Improving Cybersecurity Awareness In Advanced Payment SystemsITIO Innovex
 

Semelhante a Top 2016 Mobile Security Threats and your Employees (20)

Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
COMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptxCOMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptx
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Malware Applications Development.pptx
Malware Applications Development.pptxMalware Applications Development.pptx
Malware Applications Development.pptx
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdf
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Introduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxIntroduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptx
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
Improving Cybersecurity Awareness In Advanced Payment Systems
Improving Cybersecurity Awareness In Advanced Payment SystemsImproving Cybersecurity Awareness In Advanced Payment Systems
Improving Cybersecurity Awareness In Advanced Payment Systems
 

Mais de Neil Kemp

How To Fight Zero-Click Malware
How To Fight Zero-Click MalwareHow To Fight Zero-Click Malware
How To Fight Zero-Click MalwareNeil Kemp
 
Defence-In-Depth Cybersecurity Strategy
Defence-In-Depth Cybersecurity StrategyDefence-In-Depth Cybersecurity Strategy
Defence-In-Depth Cybersecurity StrategyNeil Kemp
 
Understanding The Environmental Impact of Laptops
Understanding The Environmental Impact of LaptopsUnderstanding The Environmental Impact of Laptops
Understanding The Environmental Impact of LaptopsNeil Kemp
 
Cyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid CybercrimeCyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid CybercrimeNeil Kemp
 
Cyber essentials
Cyber essentials Cyber essentials
Cyber essentials Neil Kemp
 
What are mobile phishing attacks
What are mobile phishing attacks What are mobile phishing attacks
What are mobile phishing attacks Neil Kemp
 
How attackers access your password
How attackers access your passwordHow attackers access your password
How attackers access your passwordNeil Kemp
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals OutNeil Kemp
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your BusinessNeil Kemp
 
CEO Fraud is on the Rise
CEO Fraud is on the RiseCEO Fraud is on the Rise
CEO Fraud is on the RiseNeil Kemp
 

Mais de Neil Kemp (10)

How To Fight Zero-Click Malware
How To Fight Zero-Click MalwareHow To Fight Zero-Click Malware
How To Fight Zero-Click Malware
 
Defence-In-Depth Cybersecurity Strategy
Defence-In-Depth Cybersecurity StrategyDefence-In-Depth Cybersecurity Strategy
Defence-In-Depth Cybersecurity Strategy
 
Understanding The Environmental Impact of Laptops
Understanding The Environmental Impact of LaptopsUnderstanding The Environmental Impact of Laptops
Understanding The Environmental Impact of Laptops
 
Cyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid CybercrimeCyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid Cybercrime
 
Cyber essentials
Cyber essentials Cyber essentials
Cyber essentials
 
What are mobile phishing attacks
What are mobile phishing attacks What are mobile phishing attacks
What are mobile phishing attacks
 
How attackers access your password
How attackers access your passwordHow attackers access your password
How attackers access your password
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your Business
 
CEO Fraud is on the Rise
CEO Fraud is on the RiseCEO Fraud is on the Rise
CEO Fraud is on the Rise
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Top 2016 Mobile Security Threats and your Employees

  • 1. Top 2016 Mobile Security Threats and Your Employees HOW YOUR EMPLOYEES EXPOSE YOU TO THE TOP MOBILE SECURITY THREATS OF 2016
  • 2. Most people believe smartphones are secure when they buy them ❖ 45% of people don’t buy security software for their smartphones ❖ They don’t even bother to use a simple password to secure their phone ❖ It only takes 30 seconds to hack into a smartphone ❖ 78% of iOS and Android apps have been hacked ❖ 50% of popular apps don’t defend against hackers
  • 3. ❖ And wiping them after they are lost doesn’t always keep data out of hackers’ hands Over 4 million smartphones were lost in 2013 alone
  • 4. Grayware and Bloatware These are intrusive applications that have been known to: ❖ Leak information ❖ Change user bookmarks ❖ Pester users to download other programs ❖ Install ads for other programs on a user’s home screen ❖ Sent SMS messages or communicate externally without the user’s knowledge Many smartphones that are preloaded with apps often contain grayware and bloatware.
  • 5. Malvertising ❖ a term used to describe ads that contain Trojans / other malicious software aimed at being embedded in one phone and then spreading. ❖ Malvertising has become a popular way for hackers to infiltrate smartphones, putting your corporate network at risk.
  • 6. Free Wi-Fi Improper session handling, unintended data leakage, poor authorization and authentication, and lack of binary protections are vulnerabilities that can often be exploited when using unsecured Wi-Fi access
  • 7. Employees as Internal threats ❖ By the end of 2018, it is expected that over 25% of corporate data will be transmitted between mobile devices and a cloud server while bypassing any perimeter security. ❖ Disgruntled employees have always been a threat to organizations and their intellectual data. Mobile devices offer the ability for individuals to bypass many standard security measures in their attempt to extricate and transmit company information.
  • 8. Top 6 Mobile Threats ❖ Cross Device Transactions ❖ Expanding Mobile Payment Options ❖ Mobile Web Browser Hacking ❖ Man-in-the-middle(MITM)Attacks ❖ Distributed Denial of Service (DDoS)Attacks ❖ Mobile Healthcare Information and Devices
  • 9. Cross Device Transactions ❖ An individual may access their work email, eBay account or mobile banking services from different devices, sometimes even on the same day. ❖ Mobile security for this type of access is often unsuccessful and leaves both the company and clients vulnerable to malicious attacks.
  • 10. Expanding Mobile Payments ▶ NFC-based mobile payments are vulnerable to bot attacks, malware, device spoofing, jailbroken devices or even rooting. ▶ Whether you offer mobile payment options or your employees use them for their purchases, your company can be at risk as a result of this vulnerability.
  • 11. Mobile Web Browser Hacking ❖ Webkit-based exploits coupled with OS/kernel-level exploits can bypass a browser sandbox and then leverage OS vulnerabilities. ❖ Stagefright has been giving Android and Android-based app programmers a run for their money as security experts try in vain to create effective security patches. ❖ This makes mobile web browser hacking most effective way to bypass smartphone system level security measures
  • 12. Man-in-the-Middle- Attacks(MITM) ❖ MITM attacks have also increased as more people are using free Wi-Fi for tablets, smartphones and laptops. ❖ Eavesdropping and hijacking are easier using these open Internet access points and if an employee is using them to access company data, the hacker will have an all access pass into your corporate network.
  • 13. Distributed Denial of Service Attacks (DDoS) ❖ DDoS attacks have become more sophisticated as hackers learn new ways to leverage old school attacks. ❖ Malevolent programmers have learned how to turn devices into DDoS bots once the hacker has gained control of them. ❖ These DDoS bots are harder to detect or prevent compared to traditional attacks, making corporations vulnerable to a threat they aren’t aware exists.
  • 14. Mobile Healthcare Information and Devices Your Employees and Health Information ❖ Mobile Healthcare Information and devices have become more of a threat as the healthcare industry struggles to make devices more intelligent and data more accessible. ❖ Surveys show that 94% of healthcare organizations admit to a cyber-attack ❖ When your employees access their medical information from a hacked organization that health care system may be monitored by hackers and used to access the devices that connect to the system via an internet connection.
  • 15. Do you want to learn more or find a solution ? You can learn more about how employees are a threat to your company’s mobile security by reading the full article here. If you want to learn more about advanced mobile security threats and how to protect your organisation, click here , comment in the boxes below or email neil.kemp@networkandsecurity.co.uk