Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the greatest return on their investment of time and resources.
As a result, mobile devices have become a favorite attack target and that trend is not likely to decrease any time soon. As the worldwide leader in mobile threat defense (MTD), protecting millions of enterprise mobile endpoints around the world, Zimperium is in a unique leadership position to deliver insight into how mobile endpoints are being targeted through device, network, app and phishing tactics.
Please join JT Keating, Vice President of Product Strategy, for free, 30-minute webinars where we will introduce you to the four mobile attack vectors, explain the damage each can cause and review how to protect your enterprise.
Many conditions increase the threat exposure of mobile endpoints – the majority of which stem from the fact that users are the admins on these devices. Users are the ones that choose whether or not to update the OS away from known vulnerable OS versions, to have a PIN code set, to jailbreak their device, etc.
Here are some insights of the major device threats analyzed by Zimperium in 1H19, as part of our State of Enterprise Mobile Security Report:
In our free webinar on August 21st, we explained:
According to the Verizon Data Breach Investigations Report, over 90% of all breaches begin with a phishing attack. Considering that almost two-thirds of emails are now read on mobile, mobile phishing is a real concern for enterprises.
This is exacerbated by another factor: mobile endpoints are a primary place that users read their personal emails on systems not protected by enterprise mail gateways with phishing protections. In addition to credential loss, when a user simply accesses a phishing site on mobile, an exploit can be delivered that compromises the device.
In our free webinar on August 28th, we explained:
Risky networks and network activities can enable data loss and are often precursors to actual network attacks. Enterprise network threats are completely user-driven since they are the ones deciding which networks to access.
Here are some insights of the major network threats analyzed by Zimperium so far in 2019 as part of our State of Enterprise Mobile Security Report:
In our free webinar on September 4th, we explained:
Organizations are aware of malicious mobile app attacks, but few understand the threats that come from sideloaded apps or legitimate apps that have hidden security and privacy threats. With users being the admins of mobile endpoints, enterprises need a way to assess the threats of the installed mobile apps and create policies around their acceptable usage/existence. Here are some insights of the major app threats analyzed by Zimperium so far in 2019 as part of our State of Enterprise Mobile Security Report:
In our free webinar on September 11th, we explained: