August 2, 2022

-
min read

Lookout Contributes to 2022 Verizon MSI With Security Insights

One of the best ways to stay up to date on how mobile devices affect your organization's security is by reading the Mobile Security Index (MSI) by Verizon. Lookout is a long-time contributor to the report, including the 2022 edition that was just published.

This year’s MSI is especially interesting, as it dives deeper into the interconnectivity that now exists between endpoint devices and cloud applications. Leveraging our platform that spans endpoint, cloud and data security, we collaborated closely with Verizon to provide stats and trends to bolster the security community’s understanding of this expanded ecosystem.

Lookout has the world’s largest dataset of mobile security telemetry sourced from over 210 million devices and 269 million apps. We also have a unified platform that includes Secure Access Service Edge (SASE) technologies. Our expertise in both areas enable us to highlight the importance of mobile security in the broader context of cloud security, rather than looking at mobile endpoints in isolation.

The report covers how challenges like expanded use of bring your own device (BYOD), changes in behavior since working from home, and the risk of mobile ransomware affect how you think about cybersecurity. It also provides a number of tactics you can use to better protect your organization against mobile risks, which is critical as employees continue to rely on mobile devices to be productive from anywhere

Here are some key takeaways from the report:

  • About 45% of companies suffered a breach involving a mobile device in the last 12 months — up from just over 20% a year ago.
  • Over 70% of organizations said that mobile devices are highly critical to their organization running smoothly
  • Almost 20% of employees transfer company data to a personal cloud account before leaving a company

Visit the Verizon MSI page to read the complete report.

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization
Collaboration

Book a personalized, no-pressure demo today to learn:

Discover how adversaries use non-traditional methods for phishing on iOS/Android, see real-world examples of threats, and learn how an integrated security platform safeguards your organization.