SlideShare a Scribd company logo
1 of 25
Download to read offline
11 Reasons
Why Your Company Could Be In Danger
In today’s interconnected world, few things terrify CEOs and CTOs more than
electronic security (well, a breach of that security, anyway). Most of our
records, personal information, corporate information, and sensitive data exist
online or on Internet-connected hardware. Mobile, with all it’s advantages for
enterprises, actually poses one of the largest emerging threats to those
enterprises’ data security. As such, we wanted to share some statistics that
demonstrate the severity of the problem and highlight the importance of
mobile security for your business.
“
”
01
92 percent of the top 500 Android apps carry either a
security or privacy risk, according to recent data from
security firm MetaIntell
Even the most popular and legitimate apps carry inherent
security risks. For the most part, these applications are not
purpose-built for enterprise security necessities, which
leaves them vulnerable to talented hackers and malware.
02
Mobile malware was up 33 percent in 2013 compared with
2012, according to McAfee
If you’re the one building the app, then you can control the security parameters pretty strictly.
However, far more corporations than not allow their employees to download apps at their
discretion on the company hardware (or BYOD hardware that’s connected to the company’s
mobile infrastructure). So, you aren’t just worried about your app, but also all of the other apps
employees could be downloading on their own.
03
35% of online adults worldwide have either lost or had
their mobile device stolen
Whenever an employee loses their phone or has it stolen,
the entire organization can become vulnerable to hacks and
malicious software. With more than one in three adults
falling prey to this, that’s a significant amount of monitoring
your IT department has to undertake
04
4 in 10 American users likely to click on an unsafe link,
according to Lookout
It’s not enough to secure your own mobile assets; you have
to train your employees better. If 40 percent of Americans
click on unsafe links, your enterprise could easily become a
target if your employees are not paying strict attention. You
have to implement a training program as well as maintain
constant monitoring of your hardware and mobile assets.
05
Researchers measured an alarming 600 percent increase in
the use of malicious web links through all vectors in 2012
Mobile isn’t the only place that’s getting scarier — the entire
Internet saw a 600 percent increase dangerous web links.
This will require even more failsafes on behalf of enterprise
IT departments as well as heightened vigilance from
employees.
06
Malicious content was hidden within social media behind
shortened web links 32 percent of the time
Social media has become invaluable to many enterprises, whether through advertising reach, trend
tracking, branding, market intelligence, big data harvesting, etc. Many individuals get most of their
news through social networks by clicking on links shared by their friends and/or colleagues. In a 140
character world, url shorteners entered the picture so that you could tweet web links without killing
all your available characters. But, it is just as easy for hackers or security threats to hide behind these
shortened links as legitimate content producers. As such, it’s important that you don’t click on
everything that has an interesting title; you have to trust the source of the tweet or Facebook post
before you think about clicking on it. If the New York Times tweets something out? You’re probably
good. If someone you don’t know tweeted something “by the New York Times,” you probably
shouldn’t click on it. If that article does actually exist, you can always just go to nytimes.com and
find it that way.
07
Only one in five emails sent were legitimate, as spam
increased to 76 percent of email traffic, and 92 percent
of spam included links to potentially malicious content
The primary tool for phishing or virus implantation on your device(s) is email. As
you can see, only 20 percent of emails sent last year were real emails intended to
go to real people containing real content. Spam was 76 percent of ALL email
traffic last year. Even more disturbing, within that spam contingency, 92 percent
of those messages included links to potentially injurious content.
That means that 70 percent of all emails sent last year contained potentially
malicious links. Always watch what you click on…
08
51 percent of organizations have had data loss due to
insecure devices
This statistic is more concerned with mobility in particular, namely, that more than half of all
organizations have suffered data loss due to device insecurity. Whether that’s employees losing
their phones, sharing data or documents they shouldn’t have, installing bogus apps on their
phones, etc., more companies than not have now suffered data breach due to mobile devices.
As an IT department, it’s more important than ever to have strict data policy in place, complete
with training, continuing education, mobile device management services, and remote wipe
capabilities. As individual employees, it’s your responsibility to adhere to the policies set by your
IT departments in order to protect the security of your firm.
09
59 percent of organizations experienced an increase in
malware infection due to insecure mobile devices
In addition to suffering from data loss, almost 60 percent of companies saw more
malware infections emanating from mobile devices. Mobile devices, especially
within firms that embrace BYOD or CYOD mobile policies, have become the
Achilles' heel of their security operations. Once again, it’s more important than
ever to have a strict security protocol in place to which you can hold your
employees accountable. As employees, these are very often your devices that you
own that become infected with malware. Take the necessary steps to mitigate
your risk!
10 Average cost of a breach is $5.5 million
Here’s where it gets real. For companies that suffer a full-scale data breach, the
average cost of repairing that breach is $5,500,000. While that number might not
be as meaningful for small businesses because that figure also takes into
account massive data breaches like you saw with Target or Visa, it still illustrates
how disastrous data loss can be.
That’s a number many companies cannot absorb. You cannot sleep on the
threat posed by mobile devices to your firm’s security unless you’re comfortable
risking financial losses like that.
11
Cybercrime in 2011 cost consumers $110 billion
worldwide and $21 billion in the US according to
Symantec’s recently released annual Cybercrime Report.
Just to put the entire theme of electronic security in context, the annual cost to consumers
is staggering. $110 billion worldwide in 2011; that number is almost certainly much higher
for 2012 or 2013.
Security is one of the cornerstone issues within our increasingly interconnected world. The
more of our lives we commit online, the more we open ourselves up to threats. The more
we conduct our careers remotely or on-the-go via mobile devices, the more we open up
ourselves and our companies to data theft. This is a gigantic problem, and only by defining
a strict security policy and rigorously enforcing it can you ensure that these types of
breaches won’t happen to you.
About Us
At Copper Mobile, we excel at one thing above all others — building apps that make business sense. As
one of the only enterprise-specific mobile firms in the country, no other mobile solutions provider can
compete with our ability to help our clients build, deploy, and ultimately turn their mobile strategies into
real business returns.
That's who we are. That's what we do. That's what we've done hundreds of times before.
Contact us today to find out why we are more than an app developer — we're your partner for all things mobile.

More Related Content

What's hot

Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Keys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsKeys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsChristine Spicuzza
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018NormShield
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpnadelamm2
 
Data Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector PlanData Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector Plansarahb171
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 

What's hot (20)

Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Keys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsKeys to Network Security & Shocking Statistics
Keys to Network Security & Shocking Statistics
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Network
NetworkNetwork
Network
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the Message
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
Estado del ransomware en 2020
Estado del ransomware en 2020Estado del ransomware en 2020
Estado del ransomware en 2020
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
Data Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector PlanData Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector Plan
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 

Viewers also liked

Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategyAxway Appcelerator
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepChris Pepin
 
Mobile first strategy, When, why ( and why Not )
Mobile first strategy, When, why ( and why Not ) Mobile first strategy, When, why ( and why Not )
Mobile first strategy, When, why ( and why Not ) Shai Wolkomir
 
Mobile-first, a quick introduction
Mobile-first, a quick introductionMobile-first, a quick introduction
Mobile-first, a quick introductionJelle Desramaults
 
Mobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User ExperienceMobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User ExperienceRaúl Castañón Martínez
 
Mobile first 2-27_14-slidesonly
Mobile first 2-27_14-slidesonlyMobile first 2-27_14-slidesonly
Mobile first 2-27_14-slidesonlyNicolas Perner
 
Introducing the Mobile-First Cloud
Introducing the Mobile-First CloudIntroducing the Mobile-First Cloud
Introducing the Mobile-First Cloudkidozen
 
Mobile first business models
Mobile first business modelsMobile first business models
Mobile first business modelsTravelmedia nv
 
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...Tatjana Salcedo
 
micE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile StrategymicE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile Strategyidescitation
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsIBM Security
 
Progressive Mobile Strategy Redux: The Future Friendly Enterprise
Progressive Mobile Strategy Redux: The Future Friendly EnterpriseProgressive Mobile Strategy Redux: The Future Friendly Enterprise
Progressive Mobile Strategy Redux: The Future Friendly EnterpriseDave Olsen
 
Big Data Session Presentations
Big Data Session PresentationsBig Data Session Presentations
Big Data Session PresentationsePSI Platform
 
Mobile First Strategy - A Game-Changing Opportunity for Your Enterprise
Mobile First Strategy - A Game-Changing Opportunity for Your EnterpriseMobile First Strategy - A Game-Changing Opportunity for Your Enterprise
Mobile First Strategy - A Game-Changing Opportunity for Your EnterpriseWSO2
 
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...Barcoding, Inc.
 
Hoe toptaken identificeren en enkele cases
Hoe toptaken identificeren en enkele casesHoe toptaken identificeren en enkele cases
Hoe toptaken identificeren en enkele casesAGConsult
 
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Nitin Gaur
 
Mobile Maturity Model
Mobile Maturity ModelMobile Maturity Model
Mobile Maturity ModelSTART Houston
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Mobile-First Strategy
Mobile-First StrategyMobile-First Strategy
Mobile-First StrategySteve Buttry
 

Viewers also liked (20)

Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategy
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
Mobile first strategy, When, why ( and why Not )
Mobile first strategy, When, why ( and why Not ) Mobile first strategy, When, why ( and why Not )
Mobile first strategy, When, why ( and why Not )
 
Mobile-first, a quick introduction
Mobile-first, a quick introductionMobile-first, a quick introduction
Mobile-first, a quick introduction
 
Mobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User ExperienceMobile APM Comes of Age as Continuous Improvement of the End-User Experience
Mobile APM Comes of Age as Continuous Improvement of the End-User Experience
 
Mobile first 2-27_14-slidesonly
Mobile first 2-27_14-slidesonlyMobile first 2-27_14-slidesonly
Mobile first 2-27_14-slidesonly
 
Introducing the Mobile-First Cloud
Introducing the Mobile-First CloudIntroducing the Mobile-First Cloud
Introducing the Mobile-First Cloud
 
Mobile first business models
Mobile first business modelsMobile first business models
Mobile first business models
 
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...
From "mobile last" to "mobile first” -- a Pragmatic Approach to Responsive De...
 
micE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile StrategymicE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile Strategy
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
Progressive Mobile Strategy Redux: The Future Friendly Enterprise
Progressive Mobile Strategy Redux: The Future Friendly EnterpriseProgressive Mobile Strategy Redux: The Future Friendly Enterprise
Progressive Mobile Strategy Redux: The Future Friendly Enterprise
 
Big Data Session Presentations
Big Data Session PresentationsBig Data Session Presentations
Big Data Session Presentations
 
Mobile First Strategy - A Game-Changing Opportunity for Your Enterprise
Mobile First Strategy - A Game-Changing Opportunity for Your EnterpriseMobile First Strategy - A Game-Changing Opportunity for Your Enterprise
Mobile First Strategy - A Game-Changing Opportunity for Your Enterprise
 
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
Mobile, Wearables, Big Data and A Strategy to Move Forward (with NTT Data Ent...
 
Hoe toptaken identificeren en enkele cases
Hoe toptaken identificeren en enkele casesHoe toptaken identificeren en enkele cases
Hoe toptaken identificeren en enkele cases
 
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
Enterprise Mobile Capability Maturity Model - Designing for a robust Digital ...
 
Mobile Maturity Model
Mobile Maturity ModelMobile Maturity Model
Mobile Maturity Model
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Mobile-First Strategy
Mobile-First StrategyMobile-First Strategy
Mobile-First Strategy
 

Similar to 11 Reasons Why Your Company Could Be In Danger

Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013Karim Shaikh
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? XNSPY
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfkostikjaylonshaewe47
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
STUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSTUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSymantec
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessIndusfacePvtLtd
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfvenkatprasadvadla1
 

Similar to 11 Reasons Why Your Company Could Be In Danger (20)

Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
W verb68
W verb68W verb68
W verb68
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
STUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSTUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability Assessment
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
 

More from Copper Mobile, Inc.

Facts Your Operations Team Would Be Stupid To Ignore
Facts Your Operations Team Would Be Stupid To IgnoreFacts Your Operations Team Would Be Stupid To Ignore
Facts Your Operations Team Would Be Stupid To IgnoreCopper Mobile, Inc.
 
8 statistics every business should know about mobile
8 statistics every business should know about mobile8 statistics every business should know about mobile
8 statistics every business should know about mobileCopper Mobile, Inc.
 
Choosing the Right OS for Mobile App
Choosing the Right OS for Mobile AppChoosing the Right OS for Mobile App
Choosing the Right OS for Mobile AppCopper Mobile, Inc.
 

More from Copper Mobile, Inc. (6)

What to watch for in 2014
What to watch for in 2014What to watch for in 2014
What to watch for in 2014
 
Facts Your Operations Team Would Be Stupid To Ignore
Facts Your Operations Team Would Be Stupid To IgnoreFacts Your Operations Team Would Be Stupid To Ignore
Facts Your Operations Team Would Be Stupid To Ignore
 
8 statistics every business should know about mobile
8 statistics every business should know about mobile8 statistics every business should know about mobile
8 statistics every business should know about mobile
 
Choosing the Right OS for Mobile App
Choosing the Right OS for Mobile AppChoosing the Right OS for Mobile App
Choosing the Right OS for Mobile App
 
Apps That Think for You
Apps That Think for YouApps That Think for You
Apps That Think for You
 
Mobilizing Your Enterprise
Mobilizing Your EnterpriseMobilizing Your Enterprise
Mobilizing Your Enterprise
 

11 Reasons Why Your Company Could Be In Danger

  • 1. 11 Reasons Why Your Company Could Be In Danger
  • 2. In today’s interconnected world, few things terrify CEOs and CTOs more than electronic security (well, a breach of that security, anyway). Most of our records, personal information, corporate information, and sensitive data exist online or on Internet-connected hardware. Mobile, with all it’s advantages for enterprises, actually poses one of the largest emerging threats to those enterprises’ data security. As such, we wanted to share some statistics that demonstrate the severity of the problem and highlight the importance of mobile security for your business. “ ”
  • 3. 01 92 percent of the top 500 Android apps carry either a security or privacy risk, according to recent data from security firm MetaIntell
  • 4. Even the most popular and legitimate apps carry inherent security risks. For the most part, these applications are not purpose-built for enterprise security necessities, which leaves them vulnerable to talented hackers and malware.
  • 5. 02 Mobile malware was up 33 percent in 2013 compared with 2012, according to McAfee
  • 6. If you’re the one building the app, then you can control the security parameters pretty strictly. However, far more corporations than not allow their employees to download apps at their discretion on the company hardware (or BYOD hardware that’s connected to the company’s mobile infrastructure). So, you aren’t just worried about your app, but also all of the other apps employees could be downloading on their own.
  • 7. 03 35% of online adults worldwide have either lost or had their mobile device stolen
  • 8. Whenever an employee loses their phone or has it stolen, the entire organization can become vulnerable to hacks and malicious software. With more than one in three adults falling prey to this, that’s a significant amount of monitoring your IT department has to undertake
  • 9. 04 4 in 10 American users likely to click on an unsafe link, according to Lookout
  • 10. It’s not enough to secure your own mobile assets; you have to train your employees better. If 40 percent of Americans click on unsafe links, your enterprise could easily become a target if your employees are not paying strict attention. You have to implement a training program as well as maintain constant monitoring of your hardware and mobile assets.
  • 11. 05 Researchers measured an alarming 600 percent increase in the use of malicious web links through all vectors in 2012
  • 12. Mobile isn’t the only place that’s getting scarier — the entire Internet saw a 600 percent increase dangerous web links. This will require even more failsafes on behalf of enterprise IT departments as well as heightened vigilance from employees.
  • 13. 06 Malicious content was hidden within social media behind shortened web links 32 percent of the time
  • 14. Social media has become invaluable to many enterprises, whether through advertising reach, trend tracking, branding, market intelligence, big data harvesting, etc. Many individuals get most of their news through social networks by clicking on links shared by their friends and/or colleagues. In a 140 character world, url shorteners entered the picture so that you could tweet web links without killing all your available characters. But, it is just as easy for hackers or security threats to hide behind these shortened links as legitimate content producers. As such, it’s important that you don’t click on everything that has an interesting title; you have to trust the source of the tweet or Facebook post before you think about clicking on it. If the New York Times tweets something out? You’re probably good. If someone you don’t know tweeted something “by the New York Times,” you probably shouldn’t click on it. If that article does actually exist, you can always just go to nytimes.com and find it that way.
  • 15. 07 Only one in five emails sent were legitimate, as spam increased to 76 percent of email traffic, and 92 percent of spam included links to potentially malicious content
  • 16. The primary tool for phishing or virus implantation on your device(s) is email. As you can see, only 20 percent of emails sent last year were real emails intended to go to real people containing real content. Spam was 76 percent of ALL email traffic last year. Even more disturbing, within that spam contingency, 92 percent of those messages included links to potentially injurious content. That means that 70 percent of all emails sent last year contained potentially malicious links. Always watch what you click on…
  • 17. 08 51 percent of organizations have had data loss due to insecure devices
  • 18. This statistic is more concerned with mobility in particular, namely, that more than half of all organizations have suffered data loss due to device insecurity. Whether that’s employees losing their phones, sharing data or documents they shouldn’t have, installing bogus apps on their phones, etc., more companies than not have now suffered data breach due to mobile devices. As an IT department, it’s more important than ever to have strict data policy in place, complete with training, continuing education, mobile device management services, and remote wipe capabilities. As individual employees, it’s your responsibility to adhere to the policies set by your IT departments in order to protect the security of your firm.
  • 19. 09 59 percent of organizations experienced an increase in malware infection due to insecure mobile devices
  • 20. In addition to suffering from data loss, almost 60 percent of companies saw more malware infections emanating from mobile devices. Mobile devices, especially within firms that embrace BYOD or CYOD mobile policies, have become the Achilles' heel of their security operations. Once again, it’s more important than ever to have a strict security protocol in place to which you can hold your employees accountable. As employees, these are very often your devices that you own that become infected with malware. Take the necessary steps to mitigate your risk!
  • 21. 10 Average cost of a breach is $5.5 million
  • 22. Here’s where it gets real. For companies that suffer a full-scale data breach, the average cost of repairing that breach is $5,500,000. While that number might not be as meaningful for small businesses because that figure also takes into account massive data breaches like you saw with Target or Visa, it still illustrates how disastrous data loss can be. That’s a number many companies cannot absorb. You cannot sleep on the threat posed by mobile devices to your firm’s security unless you’re comfortable risking financial losses like that.
  • 23. 11 Cybercrime in 2011 cost consumers $110 billion worldwide and $21 billion in the US according to Symantec’s recently released annual Cybercrime Report.
  • 24. Just to put the entire theme of electronic security in context, the annual cost to consumers is staggering. $110 billion worldwide in 2011; that number is almost certainly much higher for 2012 or 2013. Security is one of the cornerstone issues within our increasingly interconnected world. The more of our lives we commit online, the more we open ourselves up to threats. The more we conduct our careers remotely or on-the-go via mobile devices, the more we open up ourselves and our companies to data theft. This is a gigantic problem, and only by defining a strict security policy and rigorously enforcing it can you ensure that these types of breaches won’t happen to you.
  • 25. About Us At Copper Mobile, we excel at one thing above all others — building apps that make business sense. As one of the only enterprise-specific mobile firms in the country, no other mobile solutions provider can compete with our ability to help our clients build, deploy, and ultimately turn their mobile strategies into real business returns. That's who we are. That's what we do. That's what we've done hundreds of times before. Contact us today to find out why we are more than an app developer — we're your partner for all things mobile.