Mobile Users Are A Security Weakspot

Menlo Security has released the findings from its “Menlo Security Mobile Risk 2021 Report”, which explores the security concerns surrounding mobile usage as more businesses today operate remotely.  
 
Together with Sapio Research, the survey questioned respondents about the mobile security threat landscape and how businesses are responding to the cyber security challenges of the global pandemic and in the future where work is no longer bound by physical offices.
 
Menlo Security discovered that over half of global respondents (53 per cent; UK: 50 per cent) admitted that it’s not possible to be prepared for all of the tactics and strategies used by attackers targeting mobile devices.  
 
The survey was conducted among 617 IT decision makers from organisations with 1,000 or more employees across the US, UK and Australia. The interviews were conducted online by Sapio Research in April and May 2021:
 
  • More than a third (38 per cent; UK: 35 per cent) claimed that it’s impossible to keep up with the pace of these attacks. 
  • 71 per cent (UK: 72 per cent) of them had experienced phishing attacks.
  • 73 per cent of global respondents (UK: 67 per cent) believe that end users are now more susceptible to cyber attacks on mobile devices than they were five years ago. 
  • 75% of users believe they are more vulnerable to mobile attacks than a year ago with the majority of respondents unprepared for mobile threats.
  • 76 per cent of respondents (UK: 76 per cent) believe they are more vulnerable to mobile attacks than just a year ago following the shift to remote and hybrid work environments.
The survey also found that three-quarters of IT decision makers believe their organisations are more vulnerable to mobile cyber attacks than ever before. 
 
“Although many organisations are confident in their ability to identify and prevent mobile attacks, often this is just over confidence in legacy solutions that are not able to provide 100 per cent protection against the latest waves of socially engineered attacks, such as phishing and smishing or zero-days” said Mark Guntrip , Strategy Director of Menlo Security. “Even experienced professionals can fall victim to these attacks and the only way to truly prevent them in the first place is through isolation, which secures work regardless of where it happens.” 
 

Although a majority of respondents admitted they are either more susceptible to mobile attacks or they have already encountered one, a surprisingly high percentage still felt confident in the ability of their organisation to both identify and prevent them. 

Although mobile devices often make it difficult to identify the telltale signs of malicious emails or links, such as URL addresses, 88 per cent (UK: 86 per cent) still believe in their ability to identify them and 84 per cent (UK: 81 per cent) trust in their ability to prevent them. “Threat actors are always looking for the path of least resistance and given the large number of organisations and employees who are still working remotely, mobile devices have entered into the centre of attackers’ crosshairs... Unfortunately, mobile security has often been an afterthought for enterprise security strategies. Today’s businesses must rethink how they’re safeguarding their networks and what avenues are most susceptible to threats in the remote work landscape.” according to Guntrip.
 
The survey also inquired about the strategies that are most often used by organisations in the UK, US and Australia, finding that isolation adoption hovers around 40 per cent (UK: 36 per cent), lagging behind more traditional methods, such as mobile device management (84 per cent; UK: 78 per cent), and DLP (35 per cent; UK: 25 per cent), leaving a majority of organisations at risk of attack.  Just 4 per cent globally had no solutions in place yet. 
 
  • 92% of UK respondents agree that attacks on mobiles are becoming ‘more frequent and more sophisticated’ (the highest figure globally) compared to the global average of 86%.  When asked who is responsible for the security of mobile devices used for work purposes, the UK was the highest for ‘organisations’ (63% vs. 55% globally) but lowest for ‘mobile vendors’ (15% vs. 20% globally). While 22% said ‘end-users’ (vs. 25% globally).
  • In the last 12 months, UK respondents experienced the following type of mobile security attacks: Phishing (72%), Malware (58%) and Advanced Persistent Threats (31%). One in ten experienced no mobile security attacks or attempts during the last year.
  • When it comes to updating mobile devices/OSs when a new patch is issued, over half of UK respondents (53%) update ‘immediately’ or ‘same day’ (compared to 59% globally).
  • In the UK, 72% think iOS is more secure (62% globally) compared to 28% for Android (38% globally), and 68% think Apple App Store is more secure vs. 32% for Google Play.
  • UK respondents detected an average of 12 mobile security threats in the last month – the lowest number for all three countries – compared to a global average of 14.
 
Menlo Security:        Image: Unsplash
 
You Might Also Read:
 
Detecting Rogue Mobile Devices:
 
 
 
« Global Police Operation Closes Fake Pharma Websites
Maritime Shipping Line Under Attack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

Telspace Africa

Telspace Africa

Telspace Africa provide the highest level of IT security solutions including advisory, penetration testing, vulnerability assessments, red teaming, social engineering and training.

PrivateCore

PrivateCore

We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

Theos Cyber Solutions

Theos Cyber Solutions

Theos Cyber provides service-first cybersecurity solutions to digital businesses in Asia.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.

Neya Systems

Neya Systems

Neya Systems, a leader in advanced off-road autonomy and high-level multi-robot mission planning, provides innovative solutions for uncrewed ground, aerial, and surface vehicles.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.

SUCCESS Computer Consulting

SUCCESS Computer Consulting

SUCCESS Computer Consulting is a leader in managed IT and security services for small and medium-sized businesses in Minneapolis, St. Paul, and the surrounding Twin Cities Metro area.

Teal

Teal

Teal provides exceptional managed IT solutions for small- to medium-sized organizations that value real partnerships and elevated security.