SlideShare a Scribd company logo
1 of 1
Download to read offline
Mobile Insecurity
50%of companies
have zero budget
dedicated to
securing their
mobile apps.1
Shouldn’t we be doing more to protect our
security when using mobile apps?
Find out more:
securityintelligence.com/mobile-insecurity
© Copyright IBM Corporation 2015. IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corp., registered
in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade. Statements regarding IBM’s
future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.
1
The State of Mobile Application Insecurity; The Ponemon Institute
2
www.statista.com/statistics/217141/super-bowl-weekend-related-consumer-spending-in-the-us/
3
money.cnn.com/2015/02/11/news/companies/lottery-spending/
4
www.forbes.com/sites/stevecooper/2013/10/22/halloween-by-the-numbers/
5
Arxan Technologies, www.arxan.com/assets/1/7/Arxan_Application_Protection_with_IBM_Trusteer_-_Solution_Brief.pdf
6
IBM X-Force Threat Intelligence Quarterly 1Q 2015, http://ibm.co/1wEMKV3
$18 billion:
sport event
tickets3
$14 billion:
Super Bowl
XLIX food,
drinks, decor
and product2
$13 billion:
video games3
$2 billion:
Halloween
candy4
$330 million:
pet costumes4
$1.8 million:
app security1
Today’s large companies* each
spend an average of $34 million
annually to develop mobile apps
we use to shop, bank and more.
However, only an average of 5.5%
of this immense budget is spent
on securing these apps against
hackers and security breaches.1
*including many in the Fortune 500
LOTT-OH!
-win a million-
239-9
1 billionpersonal data records were
compromised by cyber-attacks
in 2014,5
and at any given time
mobile malware is affecting
11.6millionmobile devices.6
of companies
do not scan
the code in their mobile apps
for security vulnerabilities.1
40%
$70 billion:
spent on
lottery
tickets in
20143
How does this stack up
against other things on which
money is spent?
On average, a company tests less
than half of the mobile
apps they build, and 33%never test apps to ensure they’re secure.1

More Related Content

What's hot

Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet IBM Sverige
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondCompTIA
 
Smart Airplanes. Creating Connections.
Smart Airplanes. Creating Connections.Smart Airplanes. Creating Connections.
Smart Airplanes. Creating Connections.Gogo Business Aviation
 
Case Study On Micromax
Case Study On MicromaxCase Study On Micromax
Case Study On MicromaxPurvesh Shinde
 
Mobile market overview - by Willerson.pundrich
Mobile market overview - by Willerson.pundrichMobile market overview - by Willerson.pundrich
Mobile market overview - by Willerson.pundrichwillerson pundrich
 
Mobile phone penetration in india
Mobile phone penetration in indiaMobile phone penetration in india
Mobile phone penetration in indiaSarath Allapra
 
Consumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceConsumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceAkash Gupta
 
Flipkart 2.1
Flipkart 2.1Flipkart 2.1
Flipkart 2.1hetvi1
 
2nd annual mobile apps 2013
2nd annual mobile apps 20132nd annual mobile apps 2013
2nd annual mobile apps 2013raja1233
 
Airline E-commerce Travel Trends 2.0
Airline E-commerce Travel Trends 2.0Airline E-commerce Travel Trends 2.0
Airline E-commerce Travel Trends 2.0Daniel Klenk
 
Smartphone analysis in Indian Senario
Smartphone analysis in Indian SenarioSmartphone analysis in Indian Senario
Smartphone analysis in Indian SenarioLav Verma
 
Embedded Fest 2019. Віталій Нужний. The Mobility Revolution: the Software tha...
Embedded Fest 2019. Віталій Нужний. The Mobility Revolution: the Software tha...Embedded Fest 2019. Віталій Нужний. The Mobility Revolution: the Software tha...
Embedded Fest 2019. Віталій Нужний. The Mobility Revolution: the Software tha...EmbeddedFest
 

What's hot (19)

Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and Beyond
 
Smart Airplanes. Creating Connections.
Smart Airplanes. Creating Connections.Smart Airplanes. Creating Connections.
Smart Airplanes. Creating Connections.
 
GMGC2015: Driving Engagement In The Epicenter of Mobile Young
GMGC2015: Driving Engagement In The Epicenter of Mobile YoungGMGC2015: Driving Engagement In The Epicenter of Mobile Young
GMGC2015: Driving Engagement In The Epicenter of Mobile Young
 
Case Study On Micromax
Case Study On MicromaxCase Study On Micromax
Case Study On Micromax
 
Mobile market overview - by Willerson.pundrich
Mobile market overview - by Willerson.pundrichMobile market overview - by Willerson.pundrich
Mobile market overview - by Willerson.pundrich
 
Apple case study
Apple case study Apple case study
Apple case study
 
Tech Future – The Mobile Applications
Tech Future – The Mobile ApplicationsTech Future – The Mobile Applications
Tech Future – The Mobile Applications
 
Mobile phone penetration in india
Mobile phone penetration in indiaMobile phone penetration in india
Mobile phone penetration in india
 
Mobile Apps
Mobile AppsMobile Apps
Mobile Apps
 
Consumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerceConsumer acceptance of app only model of e commerce
Consumer acceptance of app only model of e commerce
 
Flipkart 2.1
Flipkart 2.1Flipkart 2.1
Flipkart 2.1
 
Flipkart 2.1
Flipkart 2.1Flipkart 2.1
Flipkart 2.1
 
2nd annual mobile apps 2013
2nd annual mobile apps 20132nd annual mobile apps 2013
2nd annual mobile apps 2013
 
Airline E-commerce Travel Trends 2.0
Airline E-commerce Travel Trends 2.0Airline E-commerce Travel Trends 2.0
Airline E-commerce Travel Trends 2.0
 
Ambarella company
Ambarella companyAmbarella company
Ambarella company
 
Smartphone analysis in Indian Senario
Smartphone analysis in Indian SenarioSmartphone analysis in Indian Senario
Smartphone analysis in Indian Senario
 
Embedded Fest 2019. Віталій Нужний. The Mobility Revolution: the Software tha...
Embedded Fest 2019. Віталій Нужний. The Mobility Revolution: the Software tha...Embedded Fest 2019. Віталій Нужний. The Mobility Revolution: the Software tha...
Embedded Fest 2019. Віталій Нужний. The Mobility Revolution: the Software tha...
 
Xiaomi
XiaomiXiaomi
Xiaomi
 

Similar to Infographic: The State of Mobile Insecurity

Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud accessAGILLY
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODAGILLY
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them Chris Pepin
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
Become a-mobile-enterprise-infographic
Become a-mobile-enterprise-infographicBecome a-mobile-enterprise-infographic
Become a-mobile-enterprise-infographicAnand Ramakrishnan
 
Ibm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcIbm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcNitin Gaur
 
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand
IBM MobileFirst: Defining a Digital StrategyCommunicating to UnderstandIBM MobileFirst: Defining a Digital StrategyCommunicating to Understand
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand Nitin Gaur
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016AGILLY
 
A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise Daryl Pereira
 
Apple and ibm partnership
Apple and ibm partnershipApple and ibm partnership
Apple and ibm partnershipteam-abr
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...bupbechanhgmail
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Jeremy Siewert
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsIBM Software India
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
 
Build a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile EnterpriseBuild a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile EnterpriseEd Brill
 
Smarter graphics - Enterprises on the move
Smarter graphics - Enterprises on the moveSmarter graphics - Enterprises on the move
Smarter graphics - Enterprises on the moveIBM Software India
 

Similar to Infographic: The State of Mobile Insecurity (20)

Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Become a-mobile-enterprise-infographic
Become a-mobile-enterprise-infographicBecome a-mobile-enterprise-infographic
Become a-mobile-enterprise-infographic
 
Ibm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcIbm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dc
 
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand
IBM MobileFirst: Defining a Digital StrategyCommunicating to UnderstandIBM MobileFirst: Defining a Digital StrategyCommunicating to Understand
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
 
A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise
 
Apple and ibm partnership
Apple and ibm partnershipApple and ibm partnership
Apple and ibm partnership
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
Build a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile EnterpriseBuild a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile Enterprise
 
Smarter graphics - Enterprises on the move
Smarter graphics - Enterprises on the moveSmarter graphics - Enterprises on the move
Smarter graphics - Enterprises on the move
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 

More from IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

More from IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Recently uploaded

Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 

Recently uploaded (8)

Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 

Infographic: The State of Mobile Insecurity

  • 1. Mobile Insecurity 50%of companies have zero budget dedicated to securing their mobile apps.1 Shouldn’t we be doing more to protect our security when using mobile apps? Find out more: securityintelligence.com/mobile-insecurity © Copyright IBM Corporation 2015. IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade. Statements regarding IBM’s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. 1 The State of Mobile Application Insecurity; The Ponemon Institute 2 www.statista.com/statistics/217141/super-bowl-weekend-related-consumer-spending-in-the-us/ 3 money.cnn.com/2015/02/11/news/companies/lottery-spending/ 4 www.forbes.com/sites/stevecooper/2013/10/22/halloween-by-the-numbers/ 5 Arxan Technologies, www.arxan.com/assets/1/7/Arxan_Application_Protection_with_IBM_Trusteer_-_Solution_Brief.pdf 6 IBM X-Force Threat Intelligence Quarterly 1Q 2015, http://ibm.co/1wEMKV3 $18 billion: sport event tickets3 $14 billion: Super Bowl XLIX food, drinks, decor and product2 $13 billion: video games3 $2 billion: Halloween candy4 $330 million: pet costumes4 $1.8 million: app security1 Today’s large companies* each spend an average of $34 million annually to develop mobile apps we use to shop, bank and more. However, only an average of 5.5% of this immense budget is spent on securing these apps against hackers and security breaches.1 *including many in the Fortune 500 LOTT-OH! -win a million- 239-9 1 billionpersonal data records were compromised by cyber-attacks in 2014,5 and at any given time mobile malware is affecting 11.6millionmobile devices.6 of companies do not scan the code in their mobile apps for security vulnerabilities.1 40% $70 billion: spent on lottery tickets in 20143 How does this stack up against other things on which money is spent? On average, a company tests less than half of the mobile apps they build, and 33%never test apps to ensure they’re secure.1