Many Organisations Are Too Lax About Mobile Data Threats

Mobile devices can be a critical part of any cyber attack, according to new research from Ponemon Institute.

For an enterprise, the economic risk of mobile data breaches—including direct operational costs as well as potential maximum loss from non-compliance and reputational damage could be as high as $26.4 million.

The report, sponsored by mobile security company Lookout, also found that mobile data breaches are more common than many might think. Two-thirds (67%) of the 588 worldwide organizations surveyed report having had a data breach as a result of employees using their mobile devices to access the company's sensitive and confidential information.

"While many organizations still consider it 'early days' in their mobile deployments, this does not mean they should be 'early days' in their security," Craig Shumard, former CISO at insurer Cigna and current cyber security advisor, said in a statement.

"It's never been more clear that mobile devices can be a critical part of the attack equation,” Shumard said. “With the rise in access to corporate data via mobile devices, those devices will become bigger targets for the bad guys. And the cost to the enterprise will only increase."

Other key findings in the research are that mobile access to corporate data increased 43% from 2014 to 2015, and 56% of the data accessible on PCs is also accessible on mobile devices. Mobile data access is expected to increase at least 50% in the next two years.

Information-Management: http://bit.ly/1pqje2S

« US Military Are Doubling Down On Robot Wars
UK: Twitter To Train Prosecutors To Fight Online Abuse »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Calian Group

Calian Group

Calian is a diverse Canadian company offering professional services in areas including Advanced Technologies, Health, Learning and IT & Cyber Solutions.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

Red Points

Red Points

Red Points protects your brand and content in the digital environment.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

Packetlabs

Packetlabs

Packetlabs specializes in penetration testing services and application security.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

ICS

ICS

ICS is a leading provider of outsourced IT services, cybersecurity, communications, and distributed workforce solutions throughout the US.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.

Accompio

Accompio

Accompio offer comprehensive support in the digitalisation of your business processes.

Cyber Brain Academy

Cyber Brain Academy

At Cyber Brain Academy, our mission is to provide high-quality IT certification training for the cyber security workforce.