1
We’re used to fighting viruses on desktops, but cybercriminals targeting mobile are more active and more sophisticated. Watch out for Mobile Malware 1 Employees love the freedom of BYOD. But IT departments? Not so much. Be BYOD aware 2 Some devices (and platforms) are more secure than others. Choose carefully! 3 Consider the device Working, playing, banking, browsing. Nowadays, protecting your device is more important than ever. 4 Think before downloading Strong encryption is encouraged for everyone, even if you think you have nothing to hide. 5 Encrypt, encrypt, encrypt Having good password hygiene is good common sense. 6 Be password smart Use a public WiFi network in a coffee shop or hotel and you’re putting your data at risk. 7 Take control of your coffee break Go on the offense by testing your defense. 8 Hack yourself Ineffective and unenforced policies are rampant within organizations. And they keep your IT team up at night. 9 Be an enforcer If you were raised on smartphones and tablets but were forced to work with outdated corporate software, you’d be defiant, too! 10 Above all don’t give in to Millennials ( 18) Millennials prefer using personal apps instead of corporate-approved apps 60% aren’t concerned about corporate security 70% admitted to bringing outside apps into the enterprise in violation of IT policies By 2020, 46% of all US workers will be millennials And their collective disregard for corporate security will be even more dangerous. Corporate allowance of BYOD has its own risks. 98% of US companies allow BYOD Nearly 1/3 have no BYOD policy Maybe that’s why 68% of firms had a mobile security breach in 2013 Audit your Mobile Device Management Policy (MDM) to make sure everything is in compliance. Design a security policy that fits your organization, culture, and devices. Restrict users or devices that don't meet certain criteria, like latest operating system, or approved browser use. Require use of a device screen lock or password-controlled entry of a certain complexity and length. Deny network access to any device that is jailbroken or altered, and remotely wipe offending devices. Enforce device encryption. Enforce restrictions on device features, software downloading & uploading, and web browsing. Deny network access if a device or app is found to have embedded malware. Detect compromised apps via blacklisting/whitelisting. Recover a lost or stolen device through GPS location tracking. Perform an enterprise-wide remote device lock. ( 17) ( 18) Spend a king's ransom on a mobile security system? Be certain it works by putting it to the test! Looking at your mobile devices and infrastructure from the perspective of a cyber criminal lets you identify gaps and weaknesses in your defenses. Hire a 3rd-party expert to try and break in. Turn off sharing. Sharing printers, files, and media in a public network is like inviting strangers into your data. Turn off WiFi. The longer you stay connected, the more opportunity hackers have to start snooping around. Turn on your firewall. It won’t protect you 100%, but it's always a good idea to activate it. Use HTTPS. Make sure the 's' in "https" appears in the URL bar. If it disappears, log out immediately. And SSL. To keep things private between a web server and your browsers, use SSL (Single Sockets Layer) to encrypt. And VPN. For the security of a private network (even when you're on a public one) activity should be routed through a company VPN. Even if public WiFi requires a password, you're still sharing the network with people you don’t know. Here are 6 ways to stay safe: (16) Stolen smartphones usually land in China With all your data And they sell for up to $1000 in the Asian black market. (11) Mobile malware runs silently in the back- ground collecting data from every email, text, picture, and social post your employees make. Lost or stolen devices easily give up company secrets, so it’s a good idea to encrypt everything, especially data in motion as it moves from one device (or cloud) to another. Lock Your Phones! Over 1/2 of mobile users never set a screen lock. (11) No wonder nearly 70% are never recovered. Who will lose a smartphone? By 2016, 35% of the world’s population will own smartphones. That’s 2.5 billion people That’s the combined populations of China and India By 2017, half the world could be smartphone users! And 1-in-10 Americans will have their phone stolen. ( 11) Consequences of phone theft: 47% report a time/productivity loss 10% report loss of confidential company data 9% had their identity stolen 12% experienced fraudulent charges on their account ( 11) Mobile Malware, Everywhere Cyber criminal wannabe’s can easily buy mobile malware generation kits and source codes on the dark web. “Malvertising” (think ‘malware advertising’) leads unsuspecting online buyers to sketchy digital stores selling phony versions of popular games and other apps—most containing malware. 86% time in apps Apps are our friends and our enemies. On mobile devices, 86% of our time is spent in apps, the source of most current cyber compromises. (5) Paid Apps too! 4% of the top 200 paid iOS and Android apps can read your calendars AUGUST Downloading dead apps 57% of the top free iOS apps fall off the top 100 list every six months. And app versions are updated so frequently that there’s a net new app almost every month. Apple (7) : 5.2% of iOS apps in use are dead 37.3% are old versions and need updating Android (7) : 3.9% of Android apps in use are dead 31.8% are old versions and need updating Whose apps are riskiest? (6) iOS - 91% show risky behavior Android - 83% (6) Avoid FREE apps 95% of the top 200 free iOS and Android apps exhibit at least 1 risky behavior. 70% allow location tracking 69% allow access to social networks 56% identify users 53% are integrated with ad networks 51% allow in-app purchasing 31% read address books and contact lists (6) (6) (8) Market Share (3) Android Apple Windows Blackberry Android relies on wireless carriers that can be slow to push out OS patches and security updates, leaving malware free to flourish. By owning the operating system (iOS), the hardware (iPhone/iPad), and the meticulously curated iTunes App Store, quality remains high MS Windows vendors don’t have much control over the OS and support fewer Mobile Device Management (MDM) policies. Many governments use BlackBerry because they’re the most secure. But even for most risk-averse enterprises, they are simply not cool—except in South Africa where Blackberry devices are #1! (4) loss of company or client data unauthorized access to company data or systems users downloading apps or content with embedded security risks malware infections lost or stolen devices Top 5 ways BYOD can expose your company to new threats: (2) Mobile malware is running rampant. 167% increase of mobile malware incidents from 2013 to 2014 (1) What to do? Block web ads and avoid public Wi-Fi to reduce risk of getting malware on your device (1) Android users - watch out! 97% of all malware is currently found on Android devices (1) Mobile Devices Can Make or Break a Business Mobile makes it easier for your staff to do their jobs, but it also makes it easier for hackers to do theirs. Companies everywhere are enjoying the flexibility and advantages that digital business solutions— especially mobile devices—can bring. Sales teams are no longer office bound. And improved collaboration is possible 24/7. But embracing a mobile-friendly workspace puts a lot of stress on IT departments. Here are 10 ways to guard against security gaps caused by BYOD and a more mobile workplace. 52% 41% 8.4% 2.9% Smartphone Theft Trends (12) USA Europe 44% 14% 11% 25% 14% 28% restaurants bars/nightclubs at work bars/nightclubs in the street restaurants 12pm-5pm 12pm-5pm When do they go missing? And 3rd party apps, baked into our devices, are not always properly secured! In 2014, a vulnerability in Samsung G4, G5, and G6 models gave attackers access the GPS, camera, and microphone. This allowed them to secretly install malicious apps that could view messages and listen in on phone calls. The culprit was the default keyboard, powered by popular app Swiftkey. (9) In 2015, researchers found 56 million items of unprotected data in gaming, social, messaging, medical, and bank transfer apps. (10) In a rush to release, app developers often leave out security or encryption code. Billions of records could be at risk. (10) items of unprotected data On top of that, we’re ‘password lazy’. 50% of us have passwords over 5 years old 77% haven’t changed our passwords in over a year 21% use passwords that are over 10 years old 73% use duplicate passwords And on average, we use just 6 unique passwords to cover 24 online accounts, often for both work and personal use. And our passwords are awful. Here’s the Top 5 from 2014 (15) 1) 123456 2) password 3) 12345 4) 12345678 5) qwerty Without security in place a missing mobile device can unlock the front door to all your company and client data. But only 37% of organizations go that extra step and use multi-factor authentication on top of standard passwords. (13) There's no need for heavy-handed BYOD solutions that alienate employees and provoke rogue behavior, but you also don’t want your IT policies ignored. Work with your IT department to provide a solution to sepa- rate personal and corporate data and keep everyone safe, happy, and productive. We can help. We’re Sophos. Sophos simplifies enterprise mobility management for BYOD environments while maximizing data and WiFi security. And with an intuitive management console to oversee apps, devices, and data, we deliver comprehensive security—from superb anti-malware to encrypted file sharing for sensitive corporate documents. We make security simple. To learn more about how we can help, visit www.sophos.com/mobile. © Sophos, Inc., 2015. | All rights reserved | www.sophos.com SOURCES: 1. Washington Examiner, 2015. Is mobile malware protection worth the money? http://washex.am/1Hpz3e6 2. Network World, 2014. Are IT groups really ready for BYOD security challenges? http://bit.ly/1jXxhJl 3. CRN, 2014. Mobile Security Smackdown. http://bit.ly/1IRlwNg 4. Quartz, 2014. Where BlackBerry utterly dominates http://bit.ly/1BlXtX3 5. Wall Street Journal, 2014. The Web Is Dying; Apps Are Killing It http://on.wsj.com/1BniA8f 6. Appthority, 2014. Winter App Reputation Report http://bit.ly/1p8I3Ip 7. Appthority, 2015. Enterprise Mobile Threat Report http://bit.ly/1fk24ie 8. Wired, 2014. Why Malvertising Is Cybercriminals' Latest Sweet Spot http://wrd.cm/1r7gM1h 9. Daily Star, 2015. If you own one these latest Samsung… http://bit.ly/1Sn74ku 10. Reuters, 2015. App Flaw May Put Billions of Mobile Data Records At Risk http://reut.rs/1Fovb9e 11. Wired, 2014. The Secret World of Stolen Smartphones http://wrd.cm/13DGakt 12. Lookout, 2014. IDG Phone Theft Report http://bit.ly/1qwXqBk & http://bit.ly/1LjHKtF 13. Safenet, 2014. Authentication Survey Report http://bit.ly/1J68qyq 14. NetworkWorld, 2015. Half of passwords are over five years old http://bit.ly/1Fp92Yg 15. SplashData, 2015. http://bit.ly/1LlhoW6 16. Lifehacker, 2014. How to Stay Safe on Public Wi-Fi Networks http://bit.ly/1iNpNmQ 17. eWeek, 2014. Mobile Security Breaches http://bit.ly/1Gy6k79 18. TechTarget, 2014. MDM policy helps protect information http://bit.ly/1Jfm4za 19. Wired, 2014. Trackvia Study http://wrd.cm/1pPYyKY How do smartphones go missing? in public places taken from house or car pickpocketed Where do they go missing? #1 #2 #3 ( 14)

Mobile Devices Can Make or Break a Businessabconsulting.agency/.../2016/10/Sophos-Mobile-Risk... · security will be even more dangerous. Corporate allowance of BYOD has its own risks

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

We’re used to fighting viruses on desktops, but cybercriminals targeting mobile are more active and more sophisticated.

Watch out for Mobile Malware1

Employees love the freedom of BYOD.But IT departments? Not so much.

Be BYOD aware2

Some devices (and platforms) are more secure than others. Choose carefully!

3 Consider the device

Working, playing, banking, browsing. Nowadays, protecting your device is more important than ever.

4 Think before downloading

Strong encryption is encouraged for everyone, even if you think you have nothing to hide.

5 Encrypt, encrypt, encrypt

Having good password hygiene is good common sense.6 Be password smart

Use a public WiFi network in a coffee shop or hotel and you’re putting your data at risk.

7 Take control of your coffee break

Go on the offense by testing your defense.8 Hack yourself

Ineffective and unenforced policies are rampant within organizations. And they keep your IT team up at night.

9 Be an enforcer

If you were raised on smartphones and tablets but were forced to work with outdated corporate software, you’d be defiant, too!

10 Above all don’t give in to Millennials

( 18)Millennials prefer using personal apps instead of corporate-approved apps• 60% aren’t concerned about corporate security• 70% admitted to bringing outside apps into the enterprise in violation of IT policies

By 2020, 46% of all US workers willbe millennialsAnd their collective disregard for corporate security will be even more dangerous.

Corporate allowance of BYOD has its own risks. • 98% of US companies allow BYOD• Nearly 1/3 have no BYOD policy• Maybe that’s why 68% of firms had a mobile security breach in 2013

Audit your Mobile Device Management Policy (MDM) to make sure everything is in compliance. Design a security policy that fits your organization, culture, and devices.• Restrict users or devices that don't meet certain criteria, like latest operating system, or approved browser use.• Require use of a device screen lock or password-controlled entry of a certain complexity and length.• Deny network access to any device that is jailbroken or altered, and remotely wipe offending devices.• Enforce device encryption.• Enforce restrictions on device features, software downloading & uploading, and web browsing.• Deny network access if a device or app is found to have embedded malware. Detect compromised apps via blacklisting/whitelisting.• Recover a lost or stolen device through GPS location tracking.• Perform an enterprise-wide remote device lock.

( 17)

( 18)

Spend a king's ransom on a mobile security system? Be certain it works by putting it to the test! Looking at your mobile devices and infrastructure from the perspective of a cyber criminal lets you identify gaps and weaknesses in your defenses. Hire a 3rd-party expert to try and break in.

• Turn off sharing. Sharing printers, files, and media in a public network is like inviting strangers into your data.• Turn off WiFi. The longer you stay connected, the more opportunity hackers have to start snooping around.• Turn on your firewall. It won’t protect you 100%, but it's always a good idea to activate it.• Use HTTPS. Make sure the 's' in "https" appears in the URL bar. If it disappears, log out immediately.• And SSL. To keep things private between a web server and your browsers, use SSL (Single Sockets Layer) to encrypt.• And VPN. For the security of a private network (even when you're on a public one) activity should be routed through a company VPN.

Even if public WiFi requires a password, you're still sharing the network with people you don’t know. Here are 6 ways to stay safe: (16)

Stolen smartphones usually land in China• With all your data • And they sell for up to $1000 in the Asian black market. (11)

Mobile malware runs silently in the back-ground collecting data from every email, text, picture, and social post your employees make. Lost or stolen devices easily give up company secrets, so it’s a good idea to encrypt everything, especially data in motion as it moves from one device (or cloud) to another.

Lock Your Phones! • Over 1/2 of mobile users never set a screen lock. (11)

• No wonder nearly 70% are never recovered.

Who will lose a smartphone? By 2016, 35% of the world’s population will own smartphones.• That’s 2.5 billion people• That’s the combined populations of China and India By 2017, half the world could be smartphone users!• And 1-in-10 Americans will have their phone stolen.

( 11)

Consequences of phone theft: • 47% report a time/productivity loss• 10% report loss of confidential company data• 9% had their identity stolen• 12% experienced fraudulent charges on their account

( 11)

Mobile Malware, Everywhere

Cyber criminal wannabe’s can easily buy mobile malware generation kits and source codes on the dark web.

“Malvertising” (think ‘malware advertising’) leads unsuspecting online buyers to sketchy digital stores selling phony versions of popular games and other apps—most containing malware.

86% time in

apps Apps are our friends and our enemies.On mobile devices, 86% of our time is spent in apps, the source of most current cyber compromises. (5)

Paid Apps too! 4% of the top 200 paid iOS and Android apps can read your calendars

AUGUST

Downloading dead apps 57% of the top free iOS apps fall off the top 100 list every six months. And app versions are updated so frequently that there’s a net new app almost every month.

Apple (7):• 5.2% of iOS apps in use are dead• 37.3% are old versions and need updating

Android (7):• 3.9% of Android apps in use are dead• 31.8% are old versions and need updating

Whose apps are riskiest? (6)

• iOS - 91% show risky behavior• Android - 83%

(6) Avoid FREE apps 95% of the top 200 free iOS and Android apps exhibit at least 1 risky behavior.

• 70% allow location tracking• 69% allow access to social networks• 56% identify users• 53% are integrated with ad networks• 51% allow in-app purchasing• 31% read address books and contact lists

(6)

(6)

(8)

Market Share (3)

Android

Apple

Windows

Blackberry

Android relies on wireless carriers that can be slow to push out OS patches and security updates, leaving malware free to flourish.

By owning the operating system (iOS), the hardware (iPhone/iPad), and the meticulously curated iTunes App Store, quality remains high

MS Windows vendors don’t have much control over the OS and support fewer Mobile Device Management (MDM) policies.

Many governments use BlackBerry because they’re the most secure. But even for most risk-averse enterprises, they are simply not cool—except in South Africa where Blackberry devices are #1! (4)

• loss of company or client data• unauthorized access to company data or systems• users downloading apps or content with embedded security risks• malware infections• lost or stolen devices

Top 5 ways BYOD can expose your company to new threats:

(2)

Mobile malware is running rampant.167% increase of mobile malware incidents from 2013 to 2014 (1)

What to do?Block web ads and avoid public Wi-Fi to reduce risk of getting malware on your device (1)

Android users - watch out!

97% of all malware is

currently found on Android devices (1)

Mobile Devices Can Make or Break a BusinessMobile makes it easier for your staff to do their jobs, but it also makes it easier for hackers to do theirs.

Companies everywhere are enjoying the flexibility and advantages that digital business solutions—especially mobile devices—can bring. Sales teams are no longer office bound. And improved collaboration is possible 24/7. But embracing a mobile-friendly workspace puts a lot of stress on IT departments.

Here are 10 ways to guard against security gaps caused by BYOD and a more mobile workplace.

52%

41%

8.4%

2.9%

Smartphone Theft Trends (12)

USA Europe

44%14%11%

25%14%28%

restaurantsbars/nightclubs

at work

bars/nightclubsin the streetrestaurants

12pm-5pm 12pm-5pm

When do they go missing?

And 3rd party apps, baked into our devices, are not always properly secured!In 2014, a vulnerability in Samsung G4, G5, and G6 models gave attackers access the GPS, camera, and microphone. This allowed them to secretly install malicious apps that could view messages and listen

in on phone calls. The culpritwas the default keyboard, powered by popular app Swiftkey. (9)

In 2015, researchers

found 56 million items of unprotected data in gaming, social, messaging, medical, and bank transfer apps. (10)

In a rush to release, app developers often leave out security or encryption code. Billions of records could be at risk. (10)

items of unprotected

data

On top of that, we’re ‘password lazy’. • 50% of us have passwords over 5 years old• 77% haven’t changed our passwords in over a year• 21% use passwords that are over 10 years old• 73% use duplicate passwords• And on average, we use just 6 unique passwords to cover 24 online accounts, often for both work and personal use.

And our passwords are awful. Here’s the Top 5 from 2014 (15)

1) 1234562) password3) 123454) 123456785) qwerty

Without security in place a missing mobile device can unlock the front door to all your company and client data. But only 37% of organizations go that extra step and use

multi-factor authentication on top of standard passwords. (13)

There's no need for heavy-handed BYOD solutions that alienate employees and provoke rogue behavior, but you also don’t want your IT policies ignored. Work with your IT department to provide a solution to sepa-rate personal and corporate data and keep everyone safe, happy, and productive.

We can help. We’re Sophos. Sophos simplifies enterprise mobility management for BYOD environments while maximizing data and WiFi security. And with an intuitive management console to oversee apps, devices, and data, we deliver comprehensive security—from superb anti-malware to encrypted file sharing for sensitive corporate documents. We make security simple. To learn more about how we can help, visit www.sophos.com/mobile.

© Sophos, Inc., 2015. | All rights reserved | www.sophos.com

SOURCES:1. Washington Examiner, 2015. Is mobile malware protection worth the money? http://washex.am/1Hpz3e62. Network World, 2014. Are IT groups really ready for BYOD security challenges? http://bit.ly/1jXxhJl3. CRN, 2014. Mobile Security Smackdown. http://bit.ly/1IRlwNg4. Quartz, 2014. Where BlackBerry utterly dominates http://bit.ly/1BlXtX35. Wall Street Journal, 2014. The Web Is Dying; Apps Are Killing It http://on.wsj.com/1BniA8f6. Appthority, 2014. Winter App Reputation Report http://bit.ly/1p8I3Ip7. Appthority, 2015. Enterprise Mobile Threat Report http://bit.ly/1fk24ie8. Wired, 2014. Why Malvertising Is Cybercriminals' Latest Sweet Spot http://wrd.cm/1r7gM1h9. Daily Star, 2015. If you own one these latest Samsung… http://bit.ly/1Sn74ku10. Reuters, 2015. App Flaw May Put Billions of Mobile Data Records At Risk http://reut.rs/1Fovb9e11. Wired, 2014. The Secret World of Stolen Smartphones http://wrd.cm/13DGakt12. Lookout, 2014. IDG Phone Theft Report http://bit.ly/1qwXqBk & http://bit.ly/1LjHKtF13. Safenet, 2014. Authentication Survey Report http://bit.ly/1J68qyq14. NetworkWorld, 2015. Half of passwords are over five years old http://bit.ly/1Fp92Yg15. SplashData, 2015. http://bit.ly/1LlhoW616. Lifehacker, 2014. How to Stay Safe on Public Wi-Fi Networks http://bit.ly/1iNpNmQ17. eWeek, 2014. Mobile Security Breaches http://bit.ly/1Gy6k7918. TechTarget, 2014. MDM policy helps protect information http://bit.ly/1Jfm4za19. Wired, 2014. Trackvia Study http://wrd.cm/1pPYyKY

How do smartphones go missing?in public places

taken from house or carpickpocketed

Where do they go missing?#1#2#3

( 14)