Reported new mobile operating system vulnerabilities increased from 115 in 2009 to 163 in 2010, up 42%.
Attacks targeting mobile devices are on the rise, and the overall threat environment grew yet more hostile in 2010, says Symantec’s Internet Security Threat Report, Volume 16. “Cell phones are coming into your work environment, and the user may own them, but they’re going to wind up with work data on them,” says Kevin Haley, director at Symantec Security Response. “Businesses really need to think about that because not only will these phone be lost, not only will these folks that work for you leave and go to other companies… the bad guys are going to be attacking these phones and trying to steal from them as well.” What steps can businesses take to mitigate these risks? “Overall you need to have good security software in place, on your desktops but as well as at the gateway. You need to have policies in place. When you talk about USB keys, you should have a policy about it,” Haley says. “Start thinking about it in terms of not just security but data loss and what the consequences are and how you can prepare yourself.”
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.