Mobile devices are the weak link in a company’s security chain, providing easy access to valuable organisational assets. This is according to Check Point Software Technologies’ third annual Security Report.
For an organisation with more than 2,000 devices on its network, there’s a 50% chance that at least six are infected.
IT providers’ top mobile security challenge is securing corporate information, while their second is managing personal devices storing both corporate and personal data.
“Corporate data is at risk, and being made aware of these risks is critical to taking the proper steps to secure mobile devices,” said Check Point South Africa.
Applications as a point of weakness
Applications are also vulnerable points of entry for businesses.
96% of organisations studied used at least one high-risk application in 2014, while 12.7 high-risk application events happen every hour.
“That creates many opportunities for cybercriminals to access the corporate network.”
The report also revealed an increase in malware in 2014, with 106 malware attacks hitting an organisation every hour.
83% of organisations studied were infected with bots in 2014, allowing constant communication and data sharing between these bots and their command and control servers.
Cybercriminals aren’t the only threat
In-network actions can also easily result in data loss, and 81% of the organisations analysed suffered a data loss incident – often caused by current and past employee actions.
“While most security strategies focus on protecting data from hackers coming in, it is equally important to protect data from the inside out,” said Check Point.
About the report
The Check Point 2015 Security Report analysed over 1,300 organisations (including 39 South African organisations).
It considered over 300,000 hours of monitored network traffic from more than 16,000 threat prevention gateways and one million smartphones.