2013 MOBILE SECURITY ANALYSIS
The iScan Online mobile security analysis provides visualization of the security landscape f...
Upcoming SlideShare
Loading in...5
×

Infographic - 2013 Mobile Security Analysis

684

Published on

The iScan Online mobile security analysis provides visualization of the vulnerability landscape pertaining to Android and Apple iOS smartphones and tablets. This report is intended to provide meaningful metrics to organizations who need to assess mobile vulnerabilities and protect confidential PII data.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
684
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
12
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Infographic - 2013 Mobile Security Analysis"

  1. 1. 2013 MOBILE SECURITY ANALYSIS The iScan Online mobile security analysis provides visualization of the security landscape for Android and Apple iOS smartphones and tablets. This report is intended to provide meaningful metrics about vulnerabilities and threat vectors to organizations who allow BYOD and mobile workers. OPERATING SYSTEM 25% 25% Master Key, Kernel Driver, Cryptography Architecture CONFIGS 25% Passwords, Bluetooth, Encryption, Jailbroken/Root, 3rd Party App Stores 25% APPLICATIONS Browsers, Gaming, Productivity, Social, Banking, Payment Processing CONFIDENTIAL DATA ‘PII’ Credit Cards, Social Security and Drivers License numbers ISCAN ONLINE MOBILE THREAT QUADRANT 53% of Android & Apple iOS devices scanned, could have been updated to prevent unauthorized access to data and applications. 423 Mobile vulnerabilities are on the rise. 365% increase in mobile vulnerabilities discovered since 2010. 155 268 Operating Systems 91 MOBILE VULNERABILITIES Applications 98% 2010 2011 2012 2013 98% of the devices scanned were running vulnerable web browsers and apps. Adobe, Trip Advisor, Firefox & Wordpress were the most common vulnerable apps. Credit Card Data Mobile Devices On average, 1 out of 11 smartphones store unprotected credit card data facilitated via cloud syncing. 5% of smartphones were lost or stolen in 2013. Configurations 94% of devices failed 3 or more security settings. 47% had no onscreen password with 96% of encryption disabled 53% 94% 10% Confidential Data Unprotected credit card data was detected on 10% of devices scanned. Commonly found in SMS Messages, Contacts & documents on SD Cards ISCAN PREDICTS The mobile threat quadrant in conjunction with the adoption of mobility and cloud syncing technologies will cause Mobile Data Breaches to become a top headline in 2014 70% 50 MOBILE SECURITY SCANNING Today there are a wide array of smartphones, tablets and laptops connecting to your network. IT Departments are quickly prioritizing mobile vulnerability scanning and remediation efforts to identify the mobile threat quadrant listed above. Scan Anyone, Anytime, Anywhere www.iscanonline.com

×