IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives Book Proposal Guidelines IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives Book Proposal Guidelines
Auerbach Publications


IT Performance Improvement



Networking and Telecommunications

Software Engineering

Project Management


Free Subscription to IT Today

Powered by VerticalResponse

Share This Article

Cloud Enterprise Architecture by Pethuru Raj, ISBN 978-1-4665-0232-1
Read an excerpt
The Internet of Things in the Cloud: A Middleware Perspective by Honbo Zhou, ISBN 978-1-4398-9299-2
Cloud Computing: Implementation, Management, and Security by John W. Rittinghouse and James F. Ransome, ISBN 978-1-4398-0680-7
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center by Brian J.S. Chee and Curtis Franklin, Jr., ISBN 978-1-4398-0612-8
Implementing and Developing Cloud Computing Applications by David E. Y. Sarna, ISBN 978-1-4398-3082-6
Cloud and Virtual Data Storage Networking by Greg Schulz, ISBN 978-1-4398-5173-9
Cloud Computing Strategies by Dimitris N. Chorafas, ISBN 978-1-4398-3453-4

Data Loss from Missing Mobile Devices Ranks as Top Mobile Device Threat
New Survey by Cloud Security Alliance Mobile Working Group Outlines Top Mobile Threats

October 4, 2012 - The Cloud Security Alliance (CSA) Mobile Working Group today released findings from a new survey that calls out the specific security concerns enterprise executives say are the real and looming threats as it relates to mobile device security in the enterprise environment. The new report, titled Top Mobile Threats, is a result of a survey of more than 200 enterprise participants representing 26 countries globally. The survey serves as an important first step in a larger effort to provide industry guidance on where enterprises should place their resources and focus when it comes to addressing mobile security threats.

With the rapid adoption of mobile computing, and immediate connection to cloud computing, the CSA established the Top Threats to Mobile Computing research discipline, in addition to the current Top Threats to Cloud Computing, to provide its membership with specific data on how the security community views such threats.

"Personally owned mobile devices are increasingly being used to access employers' systems and cloud-hosted data, both via browser-based and native mobile applications. This without a doubt is a tremendous concern for enterprises worldwide, " said John Yeoh, Research Analyst for the Cloud Security Alliance. "The results of this research will play an important role as we set out to develop much needed guidance on where time, talent and money should be placed when it comes to addressing mobile security threats."

Rank of Top Mobile Threats

  1. Data loss from lost, stolen or decommissioned devices
  2. Information-stealing mobile malware
  3. Data loss and data leakage through poorly written third-party applications
  4. Vulnerabilities within devices, OS, design and third-party applications. Insecure Wifi network or rogue access points
  5. Insecure WiFi, network access and rogue access points.
  6. Insecure or rogue marketplaces
  7. Insufficient management tools, capabilities and access to APIs (includes personas).
  8. NFC and proximity-based hacking.

"The results of the CSA Mobile Working Group survey are testament to the security threats that mobile devices introduce to the corporate network," said Patrick Harding, CTO, Ping Identity. "With more and more enterprises adopting a BYOD model, it is critical that mobile devices adhere to the same corporate security policies as other devices and that proper identity and access management processes are put in place to ensure the security and integrity of the organization."

"The results in the Top Threats to Mobile Computing report, which focused on those threats posed by smartphones and tablets, are intended to aid information security professionals and educate the industry about security concerns. In addition to identifying top threats, respondents also indicated a couple of additional concerns with 64 percent of respondents believing that NFC and proximity-based hacking will happen in 2013. Also 81 percent of respondents believe that insecure WiFi and rogue access points are already happening today. This is of particular concern as the proliferation of mobile devices consequently increases the use of and reliance on WiFi networks.

""The CSA Mobile Working Group findings highlight the threats that experts in the field find to be the most critical. There are few stronger indications of where we should be focused that that," said Dan Hubbard, CTO of OpenDNS. "As we move further into an era where mobile computing is ubiquitous, we're seeing an entirely new threat landscape that involves newer concerns like lost devices and rogue marketplaces, but also a heightened level of concern over insecure public WiFi as we rely more and more on access as we travel."

"The CSA Mobile working group is responsible for providing fundamental research to help secure mobile endpoint computing from a cloud-centric vantage point. The CSA invites interested companies and individuals to support the group's research and initiatives. Companies and individuals interested in learning more or joining the group can visit The Cloud Security Alliance.

© Copyright 2012 Auerbach Publications