May 16, 2017

-
min read

Mobile Risk: How to Think About Risks Facing Mobile Data

Today, Lookout is introducing The Spectrum of Mobile Risk research report, and the Mobile Risk Matrix to help security organizations understand the range of risks to enterprise data from mobility, and to provide data that demonstrates the prevalence of those risks.

Mobile devices are a part of every enterprise’s critical infrastructure. Employees use them every day to work. These devices access significant amounts of sensitive data and act as a conduit, transporting that data off the device through email and applications.

Threats, vulnerabilities, and other risks to data that affect PCs also apply to mobile endpoints, yet simply extending current PC security controls to mobile is ineffective. Security professionals must redefine their approach to risk management in the mobile world, and architect mobile-specific security.

The Mobile Risk Matrix

That is why we're introducing the Mobile Risk Matrix today, to assist security organizations to enable their employees to get the most value from mobile technology, securely.

GET TO KNOW THE SPECTRUM OF MOBILE RISK

In order to create the Mobile Risk Matrix, our Security Intelligence Team analyzed data from Lookout's uniquely massive global dataset of mobile code, device software, web, and network attacks compiled from both enterprise and personal active users, together with our ten years of research into mobile risks.

The Mobile Risk Matrix is organized into 12 elements; 3 components of risk and 4 vectors, seen in the image above.

Protecting against the spectrum of mobile risks in your organization

The Spectrum of Mobile Risk will impact each enterprise differently, and so each enterprise must assess it for itself.  The following are starter questions to ask when evaluating your enterprise against the Spectrum of Mobile Risk:

  1. How are you measuring the risk from each element of the matrix in your current environment?
  2. Then ask how you are controlling for that element of your mobile risk?

Most security organizations will find that they have very limited visibility into most mobile risks, and are similarly limited in how to control these risks with existing solutions.

The first step towards mitigating mobile risk is to acknowledge that the world has changed and your security needs to change with it.

The next step is to understand the spectrum of mobile risk so you can implement the right strategy to protect your data.

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization
Collaboration

Book a personalized, no-pressure demo today to learn:

Discover how adversaries use non-traditional methods for phishing on iOS/Android, see real-world examples of threats, and learn how an integrated security platform safeguards your organization.