Mobile Users Are A Security Weakspot

Menlo Security has released the findings from its “Menlo Security Mobile Risk 2021 Report”, which explores the security concerns surrounding mobile usage as more businesses today operate remotely.  
 
Together with Sapio Research, the survey questioned respondents about the mobile security threat landscape and how businesses are responding to the cyber security challenges of the global pandemic and in the future where work is no longer bound by physical offices.
 
Menlo Security discovered that over half of global respondents (53 per cent; UK: 50 per cent) admitted that it’s not possible to be prepared for all of the tactics and strategies used by attackers targeting mobile devices.  
 
The survey was conducted among 617 IT decision makers from organisations with 1,000 or more employees across the US, UK and Australia. The interviews were conducted online by Sapio Research in April and May 2021:
 
  • More than a third (38 per cent; UK: 35 per cent) claimed that it’s impossible to keep up with the pace of these attacks. 
  • 71 per cent (UK: 72 per cent) of them had experienced phishing attacks.
  • 73 per cent of global respondents (UK: 67 per cent) believe that end users are now more susceptible to cyber attacks on mobile devices than they were five years ago. 
  • 75% of users believe they are more vulnerable to mobile attacks than a year ago with the majority of respondents unprepared for mobile threats.
  • 76 per cent of respondents (UK: 76 per cent) believe they are more vulnerable to mobile attacks than just a year ago following the shift to remote and hybrid work environments.
The survey also found that three-quarters of IT decision makers believe their organisations are more vulnerable to mobile cyber attacks than ever before. 
 
“Although many organisations are confident in their ability to identify and prevent mobile attacks, often this is just over confidence in legacy solutions that are not able to provide 100 per cent protection against the latest waves of socially engineered attacks, such as phishing and smishing or zero-days” said Mark Guntrip , Strategy Director of Menlo Security. “Even experienced professionals can fall victim to these attacks and the only way to truly prevent them in the first place is through isolation, which secures work regardless of where it happens.” 
 

Although a majority of respondents admitted they are either more susceptible to mobile attacks or they have already encountered one, a surprisingly high percentage still felt confident in the ability of their organisation to both identify and prevent them. 

Although mobile devices often make it difficult to identify the telltale signs of malicious emails or links, such as URL addresses, 88 per cent (UK: 86 per cent) still believe in their ability to identify them and 84 per cent (UK: 81 per cent) trust in their ability to prevent them. “Threat actors are always looking for the path of least resistance and given the large number of organisations and employees who are still working remotely, mobile devices have entered into the centre of attackers’ crosshairs... Unfortunately, mobile security has often been an afterthought for enterprise security strategies. Today’s businesses must rethink how they’re safeguarding their networks and what avenues are most susceptible to threats in the remote work landscape.” according to Guntrip.
 
The survey also inquired about the strategies that are most often used by organisations in the UK, US and Australia, finding that isolation adoption hovers around 40 per cent (UK: 36 per cent), lagging behind more traditional methods, such as mobile device management (84 per cent; UK: 78 per cent), and DLP (35 per cent; UK: 25 per cent), leaving a majority of organisations at risk of attack.  Just 4 per cent globally had no solutions in place yet. 
 
  • 92% of UK respondents agree that attacks on mobiles are becoming ‘more frequent and more sophisticated’ (the highest figure globally) compared to the global average of 86%.  When asked who is responsible for the security of mobile devices used for work purposes, the UK was the highest for ‘organisations’ (63% vs. 55% globally) but lowest for ‘mobile vendors’ (15% vs. 20% globally). While 22% said ‘end-users’ (vs. 25% globally).
  • In the last 12 months, UK respondents experienced the following type of mobile security attacks: Phishing (72%), Malware (58%) and Advanced Persistent Threats (31%). One in ten experienced no mobile security attacks or attempts during the last year.
  • When it comes to updating mobile devices/OSs when a new patch is issued, over half of UK respondents (53%) update ‘immediately’ or ‘same day’ (compared to 59% globally).
  • In the UK, 72% think iOS is more secure (62% globally) compared to 28% for Android (38% globally), and 68% think Apple App Store is more secure vs. 32% for Google Play.
  • UK respondents detected an average of 12 mobile security threats in the last month – the lowest number for all three countries – compared to a global average of 14.
 
Menlo Security:        Image: Unsplash
 
You Might Also Read:
 
Detecting Rogue Mobile Devices:
 
 
 
« Global Police Operation Closes Fake Pharma Websites
Maritime Shipping Line Under Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

Software Testing News

Software Testing News

Software Testing News provides the latest news in the industry; from the most up-to-date reports in web security to the latest testing tool that can help you perform better.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

Cybernetica

Cybernetica

Cybernetica is an ICT company with activities in e-government, marine comms, data analysis and research in information security technologies.

DFLabs

DFLabs

DFlabs is a pioneer in Security Automation & Orchestration technology, leveraging your existing security products to dramatically reduce the response and remediation gap.

AnchorFree

AnchorFree

AnchorFree is a Virtual Private Network services provider offering secure encrypted access to the internet.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

Metallic.io

Metallic.io

Metallic (formerly TrapX) is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and other threats.