Guarding your experience

Corporate Network


06 / April / 20 Bunsi Shakiramal Visitors: 49 Rating: ★★★★★

Mobile (In) Security: Weak Point in the Corporate Network
In the era of DDoS attacks and encryptors WannaCry and Petya, the topic of information protection is becoming increasingly relevant. Although most companies have anti-virus software on their PCs, more often than not, a mobile phone is a data storage without any protection. According to statistics, most hacks occur due to the lack of awareness of the level of vulnerability of mobile devices. Think about how many applications your employees use on phones containing sensitive corporate information. Banking apps, email client, cloud storage, Slack, Skype, Facebook, password storage? The list may be endless. Even when a mobile device saves all personal information, this is the last place that users plan to protect. Today, 43% of smartphone users still do not use a lock password on their device. In the era of digitalization, business is becoming mobile and employees use smartphones to access corporate information no less than from working PCs. If your business uses antiviruses on corporate computers, is it worth considering the security of mobile devices? There is a common myth that the mobile phone OS is invulnerable, but, unfortunately, practice shows the opposite. For example, in 2016, the distribution of OS X malware increased by 744%. Over the next few years, mobile phone hacks will continue to grow as hackers find new flaws in operating systems and compromise applications that store valuable corporate data. Mobile technology has made the network security problem much wider and wider. The use of mobile devices and applications has led to the emergence of a wide range of new attack vectors and new data security issues for IT.

94% of security professionals expect mobile security incidents to continue to grow.
64% of cybersecurity workers doubt that their companies can prevent mobile device hacks.
There are many ways to use your corporate and personal data. The theft of confidential information can lead to the sale of your corporate data, information about transactions, employees and developments to your competitors, which can lead to huge financial losses. Most mobile security solutions close specific problem points, but they do not provide comprehensive protection. Check Point took into account the user’s need for a single solution that closes all the holes in the protection of mobile devices and has developed a wide range of security solutions for the B2B segment, which can prevent the leakage of valuable data from mobile devices. Check Point SandBlast Mobile protects iOS and Android devices from advanced mobile threats, providing reliable protection. SandBlast Mobile provides a complete end-to-end mobile security solution that protects mobile devices from all types of attacks:

Malicious applications
Attacks “Man-in-the-middle”;
0-day attacks
OS vulnerabilities;
Malicious links.
Cybercriminals have long regarded mobile devices as one of their priority goals, and the introduction of technologies like NFC, which make these devices an even tidbit for scammers, is adding fuel to the fire. It is worth recalling that in Ukraine, payments via Apple Pay have recently become possible; a number of banks and services have been offering their services in the field of contactless payments for some time. Therefore, in Ukraine, the security of mobile devices is becoming increasingly relevant, and the number of potential vulnerabilities is growing with each new generation of operating systems.

Comments 0