Mobile infections up to 96%: What could that mean for your bottom line?
With at least one smart device in nearly every user’s arsenal – and many holding corporate information – mobile infections pose a bigger threat to your security than ever. And that could mean untold dangers to your bottom line.
According to a Nokia report on mobile security threats for the first half of 2016, 1.06% of devices, or roughly 1 out of every 120 phones, are infected with malware.
That doesn’t seem like a lot on its face. But think of it this way: Does your organization have 100-plus users? And do some of them carry more than one device?
If so, you may already have an infected device tapping into your networks. And if the situation develops into a data breach, you know how expensive things could get.
Android leads the way
As you may have guessed, Android devices were the primary means of infection. Seventy-four percent of infected devices were Android. A distant second was Windows or PC devices at 22%.
One source of mobile threats, according to the report, were games. The authors suggest that with these apps (and any others), users would be wise to:
- never download from third-party sites
- install antivirus on mobile devices, and
- don’t give apps permissions they don’t obviously need.
Mobile malware prevention
Keeping users’ devices safe will go a long way toward keeping your networks safe. So what steps can your IT people take to prevent mobile malware infections?
Here are some that may work:
- Have a robust BYOD policy. Make sure users know your policy and what it entails when they agree to use mobile devices on your network.
- Update OSs frequently. A majority of vulnerabilities can be countered by making sure users are on the latest release of their mobile OS. This is sometimes easier said than done, especially with Android devices. But let users know they shouldn’t be ignoring prompts to download updated versions.
- Have separate Wifi networks. If users want WiFi at work, but may not need it for their jobs, try offering a separate BYOD WiFi network to isolate (somewhat) risky devices from corporate info.
- Stick to trusted app stores. It bears repeating: If an app isn’t available on iTunes or the Google Play store, don’t download it (and if it is, only download with a healthy dose of skepticism).
Free Training & Resources
Further Reading
You can now file Form 1099 series information returns using the Information Returns Intake System (IRIS) online portal. Step one is enrolli...
We’re huge fans of TED Talks. We love how powerful TED Talks strip away all the distractions and focus on the essence of one idea....
Twenty-six financial firms are on the hook for $392.75 million in fines for securities recordkeeping violations. Several of the brokers, de...
Believe it or not, more than 80% of workers like their employers’ Paid Time Off (PTO) packages. But that doesn’t stop a surpris...
Despite how important monthly financial close is, many companies still struggle to close their books within one workweek, according to a su...
Holding managers and staffers accountable for the work they do is a day-in, day-out job. Leaders in any organization may be tempted to let ...