Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Mobile Tech
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
80% of Smartphones Unprotected, Juniper Says
80% of Smartphones Unprotected, Juniper Says

By Nancy Owano
October 15, 2013 11:27AM

    Bookmark and Share
Security experts generally recommend that a company, large or small, implement a set of rules to establish just how the business is to handle PCs, smartphones and tablets carrying business information. The key, they say, is to adopt policies that not only address risks but make employees feel comfortable about compliance while still leveraging their devices.
 



Smartphones have become so convenient, so feature-rich, and so easily portable that most smartphones now carry more personal information than do PCs, a fact that has not eluded the world's cybercriminals.

Yet, despite daily headlines of rogue smartphone apps and snooping sensors, smartphone vulnerabilities are not compelling smartphone owners to rush out and seek added protection for their devices.

A recent Juniper Research survey on mobile security released this month has triggered increased concern among security watchers and IT that smartphone security is everybody's business, including, well, business.

Currently, 80 percent of smartphones are running without any type of malware protection, according to the Mobile Security report from Juniper Research, mobile research specialists.

No Action in 2013

It is small wonder, then, that cybercriminals are unleashing their creative juices and computer skills to see what they can achieve on mobile platforms, hitting consumers and businesses alike. Interestingly, Juniper researchers said the number of unprotected devices in the enterprise and consumer base will not change through the year, even though more security products for mobile devices are on the market. This cannot be great news for IT.

CEOs championed the "bring your own device" phenomenon as a smart way to increase productivity and sales by allowing users to deploy their phones and tablets to get work done in the office or on the move.

Today, though, businesses are waking up to a flip side of BYOD as an area of potential risk. IT managers, in particular, are concerned about protecting confidential business information that is now residing on workers' mobile devices. Repercussions of doing nothing amount to allowing attack vectors and vulnerabilities that could cause mayhem on corporate networks. IT also worries about employees using unsecured file sync services that the IT managers may not know about.

Get a Grip and a Balance

Security experts generally recommend that a company, large or small, implement a set of rules to establish just how the business is to handle PCs, smartphones and tablets carrying business information. The key, they say, is to adopt policies that not only address risks but make employees feel comfortable about compliance while still leveraging their devices to get work done.

Some companies have no policy in place, while other companies post informal suggestions for safe practice; others have highly recommended, if not mandatory, practices. One poll of policy making by myITforum.com, an online community for IT professionals, found that half of respondents said they had not even thought about implementing a policy, while other answers ranged from recommended but not required to required, to having thought about it but with no policy in place. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Mobile Tech
1.   Apple Smart Watch Patent Surfaces
2.   iPhone 6: Bad for Apple Tablet Sales?
3.   GoTenna: Work-Thru for Dead Zones
4.   Nokia X Phones Had Identity Crisis
5.   Microsoft Axes Android Phones


advertisement
Android SMS Worm on the Loose
Malware lets bad actors cash in.
Average Rating:
iPhone 6: Bad for Apple Tablet Sales?
Most likely, it will be a huge hit.
Average Rating:
Nokia X Phones Had Identity Crisis
'Gateway' devices didn't resonate.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 
34 European Banks Hit by Android-Skirting Malware
Criminals have been finding gaping holes in Android-based two-factor authentication systems that banks around the world are using. The result: 34 banks in four European countries have been hit.
 

Enterprise Hardware Spotlight
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.