Vulnerabilities Continue to Put Mobile Devices at Risk

Smartphones and tablets have become the most important possessions we carry every day, and everyone should be able to take advantage of the benefits these devices bring without worrying about cybercrime. The convenience and versatility of mobility has also led more organizations to allow employees to use their own devices at work. In fact, according to Check Point’s 2015 Security Report, 91 percent of surveyed organizations have seen an increase in the number of personal mobile devices connecting to corporate networks over the last two years. But even though these devices are being used to access and store sensitive business information, mobile security is often not top of mind.

Without proper security, managing personal or work files on smartphones and tablets can leave users exposed to cybercrime and puts confidential data at risk. Several high-profile vulnerabilities, like Certifi-gate, were uncovered this year, and can be used to target companies and extract sensitive data easily. If a mobile device is compromised, cybercriminals can access personal information, business emails, corporate documents, and company networks. They can also listen in on phone calls, capture login credentials as they’re typed, or even turn on the device’s video camera to record whenever they want.

Making matters worse, attackers are constantly finding new vulnerabilities to exploit, leaving mobile devices far from being safe. As mobile device usage in the enterprise continues to increase, mobile security needs to be the highest priority so devices and data stay protected against security breaches.

When it comes to mobile safety, here are a few tips to consider:

  • Lock your device: Use strong passcodes or passphrases to restrict unauthorized access on your mobile device.
  • Know your apps: Before downloading apps, make sure you are downloading them from trusted app stores. It’s also important to understand what types of information is shared with the app, including data like your location, contacts, or calendar events.
  • Keep software up-to-date: Make sure to keep up with software updates and patches. This allows you to have the latest software security for your mobile device.
  • Monitor data usage: Keep track of the data usage on mobile devices. Unusually high usage could be an indicator that your device has been compromised.
  • Supervise mobile behavior: Implement solutions that can identify suspicious or malicious behavior on devices, in apps, and in networks.


To learn more about Check Point Mobile Threat Prevention, visit