Minimizing Threats and Vulnerabilities on Mobile Platforms


Mobile devices have enabled improved benefits of computing which have likely resulted in increased efficiencies for the organization and users. However, with the potential benefits come increased challenges in maintaining a stable and secured environment at work. Mobile devices are one of the most vulnerable vectors in an organization. As its ubiquity continues to expand, organizations continue to be challenged in developing suitable security controls to minimize vulnerabilities. These challenges are generally inherent in the device and use patterns. This dilemma has therefore placed increased challenges on the information security team to defend against mobile threats, maintain security standards and minimize risks.

A 2017 McAfee Threat Report stated that over 16 million malicious mobile applications were reported in the first quarter of 2017 alone . With the same projected growth pattern this means over 60 million threats for all of 2017. Further, the widespread proliferation of mobile platforms has contributed to the exorbitant cost of data breach. This view is supported by the recent Cost of Data Breach Study, which attributes the extensive use of mobile platforms of increasing the cost per compromised record by $9 per compromised record. Given these type of information, it is hardly surprising that many industry experts forecast that mobile threats will rise in 2018.

Security analysts have identified several types of mobile threats and vulnerabilities, which can be classified into three categories: user behavior, device-related and external threats:

Given the level of vulnerabilities inherent in these devices, defense strategies to help minimize the mobile threats and their impact on the organization must be employed by the security team. Some of these strategies include:

Mobile devices can hold and have access to a significant portion of the organizational data. Despite this high level of access, these mobile devices are generally managed with minimal security controls and poor physical security practices. As a result, mobile devices continue to be attractive targets for cybercriminals. Organizations therefore need to adopt responsive and adaptive strategies to help in the fight against cybercrime.

Wilson Consulting Group provides a comprehensive set of responsive and adaptive security solutions that help organizations in managing their mobile assets and minimizing their risks and vulnerabilities.

Our experienced and qualified team stands ready to assist your organization by:

Show Buttons
Hide Buttons