Site icon Check Point Blog

Vulnerabilities Continue to Put Mobile Devices at Risk

Smartphones and tablets have become the most important possessions we carry every day, and everyone should be able to take advantage of the benefits these devices bring without worrying about cybercrime. The convenience and versatility of mobility has also led more organizations to allow employees to use their own devices at work. In fact, according to Check Point’s 2015 Security Report, 91 percent of surveyed organizations have seen an increase in the number of personal mobile devices connecting to corporate networks over the last two years. But even though these devices are being used to access and store sensitive business information, mobile security is often not top of mind.

Without proper security, managing personal or work files on smartphones and tablets can leave users exposed to cybercrime and puts confidential data at risk. Several high-profile vulnerabilities, like Certifi-gate, were uncovered this year, and can be used to target companies and extract sensitive data easily. If a mobile device is compromised, cybercriminals can access personal information, business emails, corporate documents, and company networks. They can also listen in on phone calls, capture login credentials as they’re typed, or even turn on the device’s video camera to record whenever they want.

Making matters worse, attackers are constantly finding new vulnerabilities to exploit, leaving mobile devices far from being safe. As mobile device usage in the enterprise continues to increase, mobile security needs to be the highest priority so devices and data stay protected against security breaches.

When it comes to mobile safety, here are a few tips to consider:

 

To learn more about Check Point Mobile Threat Prevention, visit http://www.checkpoint.com/mobilesecurity.

Exit mobile version