Top concern? Mobile device vulnerability management
Posted on 03 April 2012.
Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security.


According to the study, nearly 70 percent of attendees surveyed at the RSA Conference 2012 said mobile device vulnerability management is ‘very important’ when compared with other security initiatives.

That’s not surprising considering 68 percent of respondents said they currently have no way of identifying known mobile device vulnerabilities that could be affecting their network.

“Mobile devices add an entirely new level of complexity to an organization, but security too often takes a back seat to convenience,” said Ron Gula, CEO and CTO of Tenable Network Security. “Although the transient nature of mobile devices presents a unique challenge, organizations can achieve greater control by regularly scanning for vulnerabilities and monitoring the information that comes on and off their network.”

Increasing urgency to lock down mobile devices

Nearly all survey respondents said mobile devices present a security threat to their business, yet 67 percent said they either have no controls in place for mobile device usage on their network, or employees simply ignore existing mobile device usage policies.

All participants expect their businesses to increase their mobile device usage in 2012. As a result, organizations’ security budgets, in addition to their attention, are turning to mobile device security. Nearly half (44 percent) of attendees surveyed said their company planned to invest $50,000 to $100,000 in mobile device security over the next 12 to 15 months. Another 33 percent said their organization will invest $15,000 to $50,000.

“With the proliferation of enterprise mobility, the ability to keep track of these devices and understand how they impact your network and pose new security risks is critical,” Gula said. “Mobile device security needs to be a top priority, especially considering the majority of the mobile workforce will circumvent mobility policies in order to do their jobs.”

Protecting customer data is key

According to the study, protecting sensitive customer data is the top goal for security professionals when it comes to mobile device security. Forty-seven percent of respondents listed ‘protecting sensitive customer data’ as the most important reason to deploy technology that identifies known mobile device vulnerabilities for devices attached to their network. Nearly half (46 percent) listed ‘data leakage’ as the top concern when a mobile device is lost, stolen, or hacked.





Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //