Mobile Users Are A Security Weakspot

Menlo Security has released the findings from its “Menlo Security Mobile Risk 2021 Report”, which explores the security concerns surrounding mobile usage as more businesses today operate remotely.  
 
Together with Sapio Research, the survey questioned respondents about the mobile security threat landscape and how businesses are responding to the cyber security challenges of the global pandemic and in the future where work is no longer bound by physical offices.
 
Menlo Security discovered that over half of global respondents (53 per cent; UK: 50 per cent) admitted that it’s not possible to be prepared for all of the tactics and strategies used by attackers targeting mobile devices.  
 
The survey was conducted among 617 IT decision makers from organisations with 1,000 or more employees across the US, UK and Australia. The interviews were conducted online by Sapio Research in April and May 2021:
 
  • More than a third (38 per cent; UK: 35 per cent) claimed that it’s impossible to keep up with the pace of these attacks. 
  • 71 per cent (UK: 72 per cent) of them had experienced phishing attacks.
  • 73 per cent of global respondents (UK: 67 per cent) believe that end users are now more susceptible to cyber attacks on mobile devices than they were five years ago. 
  • 75% of users believe they are more vulnerable to mobile attacks than a year ago with the majority of respondents unprepared for mobile threats.
  • 76 per cent of respondents (UK: 76 per cent) believe they are more vulnerable to mobile attacks than just a year ago following the shift to remote and hybrid work environments.
The survey also found that three-quarters of IT decision makers believe their organisations are more vulnerable to mobile cyber attacks than ever before. 
 
“Although many organisations are confident in their ability to identify and prevent mobile attacks, often this is just over confidence in legacy solutions that are not able to provide 100 per cent protection against the latest waves of socially engineered attacks, such as phishing and smishing or zero-days” said Mark Guntrip , Strategy Director of Menlo Security. “Even experienced professionals can fall victim to these attacks and the only way to truly prevent them in the first place is through isolation, which secures work regardless of where it happens.” 
 

Although a majority of respondents admitted they are either more susceptible to mobile attacks or they have already encountered one, a surprisingly high percentage still felt confident in the ability of their organisation to both identify and prevent them. 

Although mobile devices often make it difficult to identify the telltale signs of malicious emails or links, such as URL addresses, 88 per cent (UK: 86 per cent) still believe in their ability to identify them and 84 per cent (UK: 81 per cent) trust in their ability to prevent them. “Threat actors are always looking for the path of least resistance and given the large number of organisations and employees who are still working remotely, mobile devices have entered into the centre of attackers’ crosshairs... Unfortunately, mobile security has often been an afterthought for enterprise security strategies. Today’s businesses must rethink how they’re safeguarding their networks and what avenues are most susceptible to threats in the remote work landscape.” according to Guntrip.
 
The survey also inquired about the strategies that are most often used by organisations in the UK, US and Australia, finding that isolation adoption hovers around 40 per cent (UK: 36 per cent), lagging behind more traditional methods, such as mobile device management (84 per cent; UK: 78 per cent), and DLP (35 per cent; UK: 25 per cent), leaving a majority of organisations at risk of attack.  Just 4 per cent globally had no solutions in place yet. 
 
  • 92% of UK respondents agree that attacks on mobiles are becoming ‘more frequent and more sophisticated’ (the highest figure globally) compared to the global average of 86%.  When asked who is responsible for the security of mobile devices used for work purposes, the UK was the highest for ‘organisations’ (63% vs. 55% globally) but lowest for ‘mobile vendors’ (15% vs. 20% globally). While 22% said ‘end-users’ (vs. 25% globally).
  • In the last 12 months, UK respondents experienced the following type of mobile security attacks: Phishing (72%), Malware (58%) and Advanced Persistent Threats (31%). One in ten experienced no mobile security attacks or attempts during the last year.
  • When it comes to updating mobile devices/OSs when a new patch is issued, over half of UK respondents (53%) update ‘immediately’ or ‘same day’ (compared to 59% globally).
  • In the UK, 72% think iOS is more secure (62% globally) compared to 28% for Android (38% globally), and 68% think Apple App Store is more secure vs. 32% for Google Play.
  • UK respondents detected an average of 12 mobile security threats in the last month – the lowest number for all three countries – compared to a global average of 14.
 
Menlo Security:        Image: Unsplash
 
You Might Also Read:
 
Detecting Rogue Mobile Devices:
 
 
 
« Global Police Operation Closes Fake Pharma Websites
Maritime Shipping Line Under Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

ThreatHunter.ai

ThreatHunter.ai

ThreatHunter.ai (formerly Milton Security) is a business that tracks down and mitigates attacks in real time using our ARGOS Platform and our Elite Threat Hunters.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

NovaTech Automation

NovaTech Automation

NovaTech products and services make the world’s power grids and essential process industries more reliable, efficient, sustainable and secure.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

CertiK

CertiK

CertiK uses rigorous Formal Verification technology to provide hacker-resistant smart contract and blockchain audits, thorough penetration testing, and customized security integrations.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

1Password

1Password

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

Harmonic Security

Harmonic Security

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.