{"id":102177,"date":"2019-10-02T06:00:43","date_gmt":"2019-10-02T13:00:43","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=102177"},"modified":"2019-10-01T13:59:44","modified_gmt":"2019-10-01T20:59:44","slug":"cloud-mobile-security-threats","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/10\/cloud-mobile-security-threats\/","title":{"rendered":"The Top 5 Mobile Security Threats and How to Mitigate Them"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">By Evin Safdia, Technical Marketing Manager, Prisma<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While the average worker has grown as comfortable using mobile devices as desktop computers, security teams have yet to catch up. Mobile devices have emerged in recent years as the leading platform for cybercrime and cybersecurity threats against organizations. However, organizations are still working to protect these relatively new additions to enterprise networks, especially since they often contain a mixture of business and personal data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some of the biggest mobile security threats companies are seeing recently include:\u00a0\u00a0<\/span><\/p>\n<ol>\n<li><b>Phishing Threats<\/b><span style=\"font-weight: 400;\">: In the past, <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-phishing-attack\"><span style=\"font-weight: 400;\">phishing attacks<\/span><\/a><span style=\"font-weight: 400;\"> largely took place by email. Today, they\u2019re primarily happening through mobile channels, such as text messaging (SMS), Facebook Messenger, WhatsApp and phony websites that look legitimate, including some that even start with the secure HTTPS extension. Spear phishing is also a rising threat as hackers target specific employees or organizations through mobile devices in order to gain access to sensitive data.\u00a0<\/span><\/li>\n<li><b>Mobile Malware:<\/b> Every website visited or link clicked has the potential to infect mobile devices with malware, such as spyware, ransomware, Trojan viruses, adware and others.<\/li>\n<li><b>Fake Public Wi-Fi Networks:<\/b> Many mobile workers today use public Wi-Fi networks at coffee shops, airports, restaurants and other locations whenever they\u2019re working outside the office. Because most cybercriminals are aware of this, they often leverage these networks to trick mobile users into connecting to fake Wi-Fi networks, placing data at risk. What\u2019s worse is, even when a company does have a policy in place against using public Wi-Fi networks, 81% of employees <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/mobile-security-index\/#report\" rel=\"nofollow,noopener\" >admit they still use them anyway<\/a>.<\/li>\n<li><b>Malicious Apps<\/b>: The world is full of software applications that can either be used over the internet or downloaded from websites, Apple App Store or Google Play. Many of these applications are legitimate and safe to use, but there are also thousands that aren\u2019t. Thus, downloading an app or granting an app permission to access functions on a mobile device may expose the user\u2019s company to a host of security and privacy risks. Some apps even collect data without asking the user for permission.<\/li>\n<li><b>Data Leaks<\/b>: Data leaks occur with any unauthorized or unintentional transfer of data from inside an organization to an external party or destination. These leaks can range from someone inside a company accidentally transferring confidential or sensitive data to a public cloud, instead of a private one, all the way to an attacker or a disgruntled employee deliberately stealing the company\u2019s data. Mobile devices, which often contain a mixture of business and personal data, make it even easier to blur the boundaries around enterprise data inadvertently or purposefully.<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Even though these threats are real and continue to grow every day, most companies still don\u2019t have robust security in place to protect and defend themselves and their mobile users.\u00a0<\/span><\/p>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe loading=\"lazy\" width=\"300\" height=\"150\" style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6040921936001\" allowfullscreen=\"allowfullscreen\" webkitallowfullscreen=\"webkitallowfullscreen\" mozallowfullscreen=\"mozallowfullscreen\"><\/iframe><\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">To overcome the challenges of mobile security threats, companies must:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">1. Take proactive steps to <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/webcasts\/protecting-branch-networks-mobile-users-prisma-access\"><span style=\"font-weight: 400;\">safeguard mobile devices and users<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ensure the company employs IT people who have both the mobile and security skills needed.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Help employees keep mobile operating systems and security patches up to date.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Add antivirus software and <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-data-loss-prevention\"><span style=\"font-weight: 400;\">data loss prevention<\/span><\/a><span style=\"font-weight: 400;\"> (DLP) tools to mobile devices.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Provide employees with better and easier ways to work besides connecting to unsecure public Wi-Fi networks, such as by finding virtual private network (VPN) replacements.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ask employees to carefully review app permissions before giving them access, and delete applications or disable permissions that may be considered high risk or could be misused.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Encourage or require employees to use multi-factor authentication (MFA) tools when connecting to the corporate network on their mobile and personal devices.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Keep up to date on the ever-changing mobile security threat landscape.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Consider creating an awareness program to bring security to the forefront of employees\u2019 minds, keeping them actively thinking about security threats as they use their mobile devices and providing best practices to ensure sensitive data is protected.<\/span><\/li>\n<\/ul>\n<p>2. Put a more modern architecture and comprehensive security solution in place that will:<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Provide mobile users with secure access to their company\u2019s network and applications without having to continually connect and disconnect.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Control and limit access to the company\u2019s network and applications based on device characteristics, such as operating system, patch level, presence of required endpoint software and so on when accessing sensitive applications.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Allow the company to continually view and inspect traffic to identify and stop any unauthorized or malicious activity.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Enable the company to apply its security policies across multiple environments.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Help enforce threat prevention and block malware.\u00a0\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Learn more about <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/secure-the-cloud-cloud-enabled-mobile-workforce\"><span style=\"font-weight: 400;\">how to protect against mobile security threats<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile security threats have increased against enterprise networks, but organizations can take steps to protect workers and devices. <\/p>\n","protected":false},"author":663,"featured_media":102200,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768],"tags":[414,149,6856],"coauthors":[6846],"class_list":["post-102177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","tag-mobile-security","tag-saas","tag-vpn-replacement"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/10\/Phone-and-laptop.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=102177"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102177\/revisions"}],"predecessor-version":[{"id":102185,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102177\/revisions\/102185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/102200"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=102177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=102177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=102177"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=102177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}