Mobile threats are on the rise. When mobile devices first started to hit mass adoption, there were a lot of fears over malware and exploits. At first, those threats failed to materialized, and both individuals and organizations alike became complacent about the risks to mobile devices. Today, mobile devices are one of the top threats to organizational data security.
According to recent research, up to 45% of corporate data remains on the endpoint, often unprotected. New research from AdaptiveMobile found that up to 80% of connected devices in organizations are vulnerable to malicious attack, not to mention the daily dangers inherent to endpoint devices. This report mirrors data from HPE, which also indicates the rise in threats and vulnerabilities on mobile devices. With the number of connected devices, both mobile and from the Internet of Things (IoT), these dangers are set to increase exponentially.
The current ‘boundaries’ approach to data security is both ineffective on mobile devices and cannot be scaled to all the new ’things’ adding to the marketplace. The ability to automatically detect threats, whether those are malware or devices that could be at risk, is key to protecting the devices of today (and tomorrow).
The growing attack surface presented on the endpoint, combined with the rise of the insider threat from malicious, negligent or unsuspecting employees, means that it’s easier than ever for data to be put at risk, and more costly than ever too.
Persistence technology by Absolute helps organisations to successfully mitigate the risks of a data breach from missing devices and insider threats, as well as effectively implement risk management and governance strategies for the use of devices, including automated alerts if changes occur on the device (such as anomalous device behavior, disabled encryption or SCCM malfunction). Learn more at Absolute.com