Careless employees the greatest mobile threat

1 January 2015 Information Security

Check Point Software Technologies has published its third mobile security report, revealing that 95% of respondents face challenges with securing and supporting Bring Your Own Device (BYOD) – highlighting the need for more robust security solutions for personal devices tied to the corporate network.

Based on a survey of over 700 IT professionals, the report highlights the ongoing concern at the ease of transporting sensitive corporate information outside of managed environments and details the potential mobile security threats due to lack of employee security awareness or training.

Key findings include:

• The greatest threat resides within your organisation – 87% of surveyed professionals believed that the greater security threat to mobile devices were careless employees. Nearly two-thirds of the respondents believed that recent high-profile breaches of customer data were likely due to employee carelessness.

• Proliferate use of personal mobile devices on the corporate network – Despite careless employees as the weakest link into businesses, 91% of IT professionals saw an increase in the number of personal mobile devices connecting to their networks over the past two years. In 2014, 56% of those surveyed managed business data on employee-owned devices, up from 37% in 2013.

• Mobile security incidents expected to rise – 2015 is shaping up to be a risky year, according to those surveyed. Of the security professionals surveyed this year, 82% expect the number of security incidents to grow in 2015. Additionally, nearly all of the respondents (98%) expressed their concern about the impact of a mobile security incident, with the greatest concern being the potential for lost and stolen information.

• Cost of mobile security incidents continue to rise – 2014 saw an increase in remediation costs for mobile security incidents. Of the IT executives surveyed, 42% noted that mobile security incidents cost their organisations more than $250 000 (+R2,7 million).

• Android continues to be perceived as having the greatest security risks – Android risk increased from 49% in 2013 to 64% this year, as the platform with greatest perceived security risk – as compared to Apple, Windows Mobile, and Blackberry.

Doros Hadjizenonos
Doros Hadjizenonos

“Through our 2014 Mobile Security Survey, it is clear that IT professionals are not seeing an end to mobile security threats, and in fact, are preparing for an increase of these incidents in 2015,” said Doros Hadjizenonos, Check Point South Africa’s sales manager. “We have also recently announced the Check Point Capsule, which helps to solve these challenges as a complete mobile solution that ensures seamless security regardless of wherever the data or device goes.”

The 2014 Mobile Security Report coincides with the launch of Check Point Capsule, a single mobile solution that offers unparalleled protection for business data and mobile devices, everywhere. Check Point Capsule brings multi-layer security that protects business data on mobile devices through secure access to work; prevents internal and external data leakages by attaching security that travels with the document; and extends the corporate security policy to protect devices from threats when outside of the corporate network.

For more information about the Check Point Capsule, or for a full copy of third edition of the report, The Impact of Mobile Devices on Information Security, visit: http://www.checkpoint.com/capsule/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.