+1-888-690-2424

Mobile Malware — Will it Expand in 2014?

Entrust

Normal
0

false
false
false

EN-US
X-NONE
X-NONE

/* Style Definitions */
table.MsoNormalTable
{mso-style-name:”Table Normal”;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:””;
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:”Calibri”,”sans-serif”;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}

This comes as no surprise, but the bring-your-own-device (BYOD) movement has reached critical mass.  More and more enterprises are leveraging mobile to share information, complete transaction or increase business efficiency. In fact, 67 percent of organizations use personal devices at work, and 42 percent of companies surveyed now allow BYOD at the enterprise level. 

Unfortunately, this widespread mobile adoption could prove to be a major problem heading in 2014 from a digital security standpoint. That’s because experts across the digital security industry believe that over the course of the next year malware will evolve into a much heavier threat.

shutterstock_133131995

It is being predicted that malware attacks toward enterprises — specifically financial institutions — will become more intense, and harder to catch. As a result, the mobile community could be in danger as the BYOD movement continues to grow and malware attacks intensify. Users are now being advised to be especially careful when transferring information to the cloud and to other users.

IT managers are also being strongly encouraged to invest in security solutions to protect end-users when transferring sensitive, valuable or personal information.

The answer? Strong authentication, device certificates and MDM integration can help bolster existing security policies and make sure that third parties remain unable to gain access to applications and databases. It is also recommended that IT managers implement multifactor security elements into BYOD policies to prevent information from falling into the wrong hands.

While mobile malware is a constantly evolving landscape, a simple fact remains: to date, there have been no known instances of malware jumping sandboxes or penetrating a properly secured application. The shared data items (e.g., contacts, photos, etc.) are still the only known elements a malicious program can access. And the most common source of malware on mobile devices is malicious programs side-loaded onto an Android device from a third-party app store.

In fact, it’s highly recommended to not jailbreak, root or side-load mobile devices. This opens the devices to malicious software that normally wouldn’t end up on a mobile device.

Ready for more? Click here for more information about how Entrust can keep you fortified as the amount of mobile malware increases.

Entrust
Entrust

Entrust provides identity-based security solutions that empower enterprises, consumers, citizens and websites in more than 5,000 organizations spanning 85 countries. Entrust's identity-based approach offers the right balance between affordability, expertise and service. With more than 125 patents granted and pending, these world-class solutions include strong authentication, physical and logical access, credentialing, mobile security, fraud detection, digital certificates, SSL and PKI.

0 Comments

Add to the Conversation