The Mobile Data Report uncovered – moving past data issues
Mobile Working

The Mobile Data Report uncovered – moving past data issues

This is a contributed piece by Eldar Tuvey, CEO of Wandera

 

Now more than ever, enterprises need to stay on top of their mobile security and data usage trends, and monitor traffic patterns across their entire fleets of employee devices. Failing this, businesses could incur severe breaches of company data.

There is no doubt that awareness and investment in cyber security is on the rise – according to IDC the worldwide enterprise security software market will grow to $3.21 billion in 2020. But dangers still remain. In order to educate enterprises on the continuing threats employee devices are exposed to, Wandera has published its quarterly Mobile Data Report (MDR) for Q1 2016. The report reveals a number of worrying statistics from enterprise mobile devices that continue to endanger the privacy and productivity of businesses.

The findings from this report alerts enterprises to the severity of the issues that are continually affecting mobile devices, and also gives proactive suggestions on how to combat them. 

 

Sensitive data is continuing to leak

In December 2015, Wandera announced the discovery of the CardCrypt security flaw affecting sixteen high profile companies. The study revealed each company had failed one of the most basic security requirements – not fully encrypting the traffic to the payment pages of their mobile website or app. This meant that customers who used these services were unknowingly at risk of having their information stolen. Ranging from entire passport to credit card details, employees and companies were unintentionally exposing themselves to damaging situations.

Regrettably, the MDR uncovered a continued rise in apps and mobile websites leaking credit card data, with several new cases from prominent brands including the Hong Kong metro system. It identified a 17% increase (Q1 2016 vs Q4 2015) in apps and mobile websites leaking credit card data, alongside a particular growth in password, email, location and user ID leaks.

Wandera is in contact with these sites and apps to rectify and assist in pinpointing the root causes of the issues, but it raises the question – how does this keep happening? While the problem is being addressed by the app developers and companies themselves, enterprises need to protect their mobile devices and their employees.

 

Avoiding malicious domains

Among the key findings within the report is the unusually high and accelerated growth in malicious domains visited by users in Q1 2016. A massive 200% increase per month throughout the quarter was attributed to a rise in ad frameworks used within apps and websites that are directing users to domains with a history of malicious activity. Users are not directly exposed to the malicious domains since they are only preloaded in a compromised advert, however a wrong tap in a game or in an app might be enough for the user to be redirected to an unofficial app store, fake website or to be directly offered the installation of a malicious app.

While the report revealed that improved education seems to be helping users avoid visiting malicious websites through typical routes (phishing attacks or risky browser use), users are nonetheless increasingly being exposed to malware. CIOs must help their employees with further detailed education on what may constitute a compromised ad, and how to stay safe in a mobile world.

 

Data usage in the enterprise

The report revealed the top 10 apps by data usage on enterprise devices in Q1; while email and Safari were unsurprisingly representative of the majority of data usage (34%), five of the remaining eight were all non-work related: Facebook (10%), Instagram (3%), Twitter (2%), WhatsApp Messenger, Spotify Music and Snapchat (all 1%). Combining email, video and social networks account for 49% of total data used.

The findings suggest that CIOs need to be appreciative of how non-work-related apps such as Facebook and Snapchat consume huge portions of corporate data allowances, possibly resulting in the risk of enterprise bill shock. Policy controls, which restrict access, and education, need to be in place to implement an effective means of minimising excessive consumption of data.

The leaks, hacks and unplanned attacks will continue to happen. Enterprises need to be in control of their mobile fleets and truly understand what is happening on their devices. We believe that in-depth knowledge of employee mobile data traffic is the crucial first step to secure enterprise mobility.

PREVIOUS ARTICLE

«A non-dystopian future of robot co-workers

NEXT ARTICLE

Job fears see Brits proactively upskill online»
author_image
IDG Connect

IDG Connect tackles the tech stories that matter to you

Add Your Comment

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Will Kotlin overtake Java as the most popular Android programming language in 2018?