Part #5: The Dangers of Underestimating Mobile Threats

The COVID-19 pandemic has had a dramatic effect on every organization since it came on the scene in late 2019. Businesses of all sizes and shapes around the world have had to adapt at the speed of light, and to make significant infrastructure changes so their employees could work from home. But that was, and still is, far from simple. Not only because employees, while working from home, are more prone to incautious behavior and non-compliance to corporate policy. But also because cybercriminals have been rigorously developing malicious new strategies for breaching corporate networks.

Over the past few months, the Check Point Research team have been paying close attention to these malicious activities while our teams have been working closely with hundreds of organizations of all sizes and industries, helping them adapt to the new reality of a perimeter-less organization. Our 8-part video guide on ‘How to Secure your Remote Workforce’ is where we share all the knowledge and best practices that we have gained. From insights on new infection vectors to the best way to protect endpoints, mobile devices and cloud-based and email and collaboration apps. We share facts, insights, and best practices, so you can detect and prevent cyberattacks and secure your remote workforce in the new normal.

Sign up to our 8-Part Video Guide now to view all the episodes as they go live, and obtain this critical information to securing your remote workforce.

To learn more, take a few moments to watch the video guide trailer:

About Episode #5: The Dangers of Underestimating Mobile Threats

Some organizations tend to underestimate mobile security, and in today’s world that can be a serious issue. In this week’s episode, led by our Director of Threat Intelligence & Research, Maya Horowitz, we will explore the recent rise in the number of mobile driven attacks and data breaches, discovered by Check Point Research (CPR). The group uncovered Coronavirus-related malicious campaigns, sophisticated mobile ransomware attacks, and even Mobile Device Management (MDM) getting weaponized.

To learn more, take a few moments to watch the video guide trailer:

In the episode we will explore the recent dangers of mobile threats, and how cyber criminals capitalize on employees accessing corporate data and exchanging business communications through their personal mobile devices, which are unsecure in their essence. From recent COVID-19 malicious applications to ransomware going mobile, there is a lot you need to know about the dangers of underestimating mobile threats.

Sign up to our 8-Part Video Guide now to view all the episodes as they go live, and obtain this critical information to securing your remote workforce.

You may also like