A #trojan horse. That is a good way to describe the current trend known as #byod. Byod's growth is ongoing and the future of bring your own device is its continued saturation of corporate networks. A proliferation of devices and applications for byod intrgration are being incorporated apace into traditional corporate networks and now cloud based systems as well:

  • smart watches
  • smart Cars
  • drones
  • wearables

Which bodes for many sleepless nights for CTOs and other IT pros tasked with all of those mobile application security assessments. Mobile app security testing is just one tool to employ for those hoping to keep their company networks secure and operational.

Advertisements
Advertisements

Mobile devices rife with security flaws

According to research conducted by Cap Gemini 20% of queried enterprises lack sufficient time and resources to check for any security issues with many of the mobile devices currently in use on their networks!

A study by mobile security firm NowSecure found numerous vulnerabilities that could be transferred to your network if strict precautions are not employed:

  • almost a quarter of mobile apps --often using one size fits all do it yourself software development kits, with the code available to anyone, including hackers-- contain security issues.
  • over a third of communications sent by mobile devices are not encrypted, making it easy for #malware to take root.
  • business apps are poorly secured and leak sensitive login info.

Stop byod caused network vulnerabilities

Before an attack can jeopardize your system, employ the well trained eyes and ears of a competent mobile application security assessments professional who can better assess your individual network's security, or lack thereof.

Advertisements

When it comes to preventing crypto locker ransomware incidents, reinforcing basic information security regimes must not be left to chance. According to a revised Department of Homeland Security Alert, ios users may rest a little easier because crypto locker affects only Windows based systems running either:

  • Windows 8
  • Windows 7
  • Windows Vista
  • Windows XP operating systems.

The alert, issued by the US Computer Emergency Readiness Team (US-CERT), cites fake emails, UPS or Fed Ex tracking notices or else the malware may come on the heels of a botnet infection.