By Rick Rogers, Area Manager for East and West Africa at Check Point Software Technologies
|
LAGOS, Nigeria, September 30, 2016/ -- HummingBad. Stagefright. QuadRooter.
Mobile malware and vulnerabilities have been making headlines well over the past year, and attacks are becoming a more common way for cybercriminals to steal sensitive data. We believe this trend – one that our research team encounters daily – is illustrated in the Gartner Market Guide for Mobile Threat Defense (http://APO.af/xHieRt) Solutions.* This rise in the sophistication and volume of mobile malware and continued exposure to unknown vulnerabilities demonstrates how Android and iOS devices simply aren’t secure on their own. According to the Check Point 2016 (https://www.CheckPoint.com)
The Mobile Threat Defence Market is Growing Rapidly
Mobile malware and vulnerabilities aren’t all that different than their cousins in the PC world. We’ve seen how today’s mobile malware imitates techniques introduced by PC malware. According to the 2016 Security Report the five major categories of attacks and vulnerabilities challenging the mobile device space are:
Is your business ready for the next mobile breach? Find out!
According to Gartner, “by 2018 fewer than 15% of organisations will have mobile threat defense (MTD) in place, which is an increase from fewer than 5% today.” We believe if the number of organizations implementing MTD solutions triples by 2018, it becomes that much harder for cybercriminals to infiltrate and exploit mobile devices, and gives them even less motivation to do so.
The time to act is now. If organisations don’t do something soon to stop mobile malware in its tracks, we’ll soon face a problem on a much wider scale, like the one we encounter already for PCs today.
Organisations Need Across-the-Board Protection
Cybrercriminals focus on three main vectors to conduct attacks on mobile devices:
Accordingly, Gartner says “MTD solutions provide security at one or more of these four levels:
Check Point Mobile Threat Prevention (http://APO.af/u0qi2j) combats threats all four of these levels to help keep mobile devices and data safe. It uses static and dynamic threat analysis to detect malicious and leaky apps. It detects and blocks jailbreak or root attempts which can undermine a device’s built-in protections, and it blocks network attacks and malicious network connections.
With billions of new connections formed every minute, the world is more globally linked than ever. Innovations like cloud, mobility and IoT are changing the way we deploy, the way we consume, and the way we secure technology. More and more malware is being put into our ecosystem that traditional security techniques are powerless to prevent. Given this, staying a leader requires being one step ahead of things you cannot see, know or control – and preventing attacks before they happen. Organisations need to do everything in their power to ensure that they are as secure as possible. Some of the best practices to protect your mobile business are:
For the modern enterprise advanced threat prevention, mobile device protection and segmenting a network are all critical components in order to secure themselves.
*Gartner Market Guide for Mobile Threat Defense Solutions, John Girard, Dionisio Zumerle, Published: 28 July 2016
Distributed by APO on behalf of Check Point Software Technologies Ltd..
|
Stay informed with the latest company news and developments in Egypt and the region through our unbiased and direct news platform. Our blog publishes press releases and news directly from companies and their PR agencies, giving you a clear and unfiltered view of the industry. Make informed decisions with our easy to follow and clutter-free approach to company news.