IT leaders: three quarters experienced a mobile data breach

IT leaders: three quarters experienced a mobile data breach

IT leaders: three quarters experienced a mobile data breach
Aaron Cockerill, Vice President of Products, Lookout

Written by Aaron Cockerill. Vice President of Products, Lookout.

When you hear about major corporate breaches in the news, they don’t always originate from the same threat vector. Sony was allegedly hacked through PCs, Target through point of sale systems, J.P. Morgan likely through unprotected server infrastructure, the IRS through its “Get Transcript” app.

According to a new report from IDG Research, mobile is an important vector for attack. Seventy-four percent of IT leaders from global enterprises report that their organisations have experienced a data breach as a result of a mobile security issue.

Data breaches can have wide-reaching, damaging effects, and unfortunately, too many organisations are finding this out only after suffering an attack. One of the IDG survey respondents, the IT leader of a mid-sized professional services organisation, says his company was quite surprised at how its breach came about. Although it initially appeared that a rogue employee within the business was leaking sensitive information to unauthorised parties, they eventually discovered the culprit was a compromised mobile device with high-level access to a company database.

“It took a little over a month to pinpoint exactly where the breach transpired,” he says.

“However, after a significant amount of effort, we were able to find malware installed on a company-owned mobile device assigned to one of our executives. We are still going through the due diligence process to determine the particulars around how the malware ended up on this device. However, it definitely opened our eyes to the dangers of allowing users to access data from their mobile devices.”

When employees carry around or are able to access massive amounts of corporate data on their mobile devices, IT and security leaders need visibility into the potential security risks that may be present on those devices.

The good news is that the IT leaders surveyed by IDG recognise the risks and are making it a priority to invest in security solutions that protect mobile devices and in turn, the data they access and store.

With mobility, even corporate owned devices have become personal ones. Employees may download a free game or connect to the free WiFi at a local coffee shop, both seemingly benign activities that may actually put corporate data at risk. Now, it’s more important than ever to supplement mobile security technology with employee education around the mobile device behaviours that may be risky.IT leaders: three quarters experienced a mobile data breach

October is Cybersecurity Awareness Month and throughout the month, Lookout will be sharing actionable mobile security advice that will teach readers about the risks and what can be done to keep information and accounts safe.

[su_button url=”https://www.lookout.com/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more on Lookout click here[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by SentinelOne

SentinelOne to Spotlight AI-Power at GISEC 2025

SentinelOne announces its participation at GISEC Global 2025 (6-8 May) at the Dubai World Trade Centre. The company will highlight..
Two young intercultural programmers trying to solve problem with access to data while interacting in front of computers

DDoS attacks targeting critical infrastructure

NETSCOUT released its 2H2024 DDoS Threat Intelligence Report, revealing how Distributed Denial of Service (DDoS)…
Copyright: Security Buyer

ASIS UK Launches “Security is You(th)” Hackathon

ASIS International UK has launched Security is You(th), an initiative designed to engage students and early-career professionals…
BeyondTrust

Into the Cloud – Morey J. Haber, BeyondTrust

The January edition of International Security Buyer featured Morey J Haber, Chief Security Advisor for BeyondTrust in our Into the Cloud…
Riham Security website

Growing Intersec Saudi Arabia

Intersec Saudi Arabia’s Event Director, Riham Sedik, discusses the event’s future growth and government partnerships
GITEX

Security Buyer Team at GITEX Global 2024

The International Security Buyer team is thrilled to be attending GITEX Global 2024 in Dubai, where the show has already kicked…
Cloudflare

Taking Back IT and Security Control – Connectivity Cloud

Bashar Bashaireh, Managing Director & Head of Middle East and Türkiye at Cloudflare explores taking back IT and Security Control.
Sertan Selcuk, Vice President of METAP & CIS - OPSWAT

The Innovator – OPSWAT

Sertan Selcuk is the VP of OPSWAT in the Middle East, Turkey, Africa, and Pakistan (METAP) region talks to Rebecca Spayne…
Qualys

Qualys Unveils TotalCloud 2.0

Qualys, provider of disruptive cloud-based IT, security and compliance solutions, has unveiled TotalCloud 2.0. This significant upgrade…
Ronak Desai, Senior Vice President and General Manager, Cisco AppDynamics and Full-Stack Observability

Cisco Transforms Application Instrumentation with Smart Agent

Cisco has launched Smart Agent for Cisco AppDynamics, enabling agent lifecycle management, dramatically simplifying…
Scroll to Top