Article | May 9, 2016

Hackers Swarm To Mobile Devices

Source: Connection

Know Your Threats

As IT struggles to get out in front of enterprise security risks, mobile devices are adding another wrinkle to defense plans as they become an increasingly active attack vector.

Not long ago, IT’s primary security mission was centered on locking down the desktop and creating a tight perimeter around the network to safeguard enterprise data assets. Then came the influx of smartphones and tablets and everything changed. Thanks to rise of the Bring Your Own Device (BYOD) movement, Gartner is predicting the primary endpoint breach to be tablets and smartphones by 2017, with the majority of transgressions tied to mobile application misconfiguration and misuse, not traditional technical attacks.

The potential for exploits has caught the attention of many, including the Government Accountability Office, which issued a report raising concerns about the state of security on mobile devices while making recommendations for better controls. The 2012 findings, which estimated the number of malicious software variants aimed at mobile devices rising from 14,000 to 40,000 in less than a year, placed much of the blame on inconsistent use of controls on the devices along with users’ general lack of awareness of security risks in a mobile environment.

access the Article!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of Health IT Outcomes? Subscribe today.

Subscribe to Health IT Outcomes X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to Health IT Outcomes