The Mobile Executive

The smallest mobile device may be the biggest business security hole in a company. Why? The advent of BYOD (Bring Your Own Device) opens up companies to mobile threats that may slip through the network cracks because of employee negligence.

As an executive on the go you likely rely on personal devices such as a mobile phone and tablet, using them for work and connecting them to the company network. You may be using mobile apps to help save time, increase revenue and productivity, and reduce costs.

But anyone who adopts mobility should realize that they open themselves up to certain business security risks.

The 400 million activated Android-based devices means big business for both Google and those who target the OS. Moreover, we found that only 20% of Android-based devices have security apps installed.

Cybercriminals will always target a popular platform—the more popular, the more potential victims there are to take advantage of. 2012 saw cybercriminals paying more attention to the mobile front, with a 350-fold increase in Android malware.

Mobile devices also have a high risk of theft. In fact, smartphones and cellphones make up 30 to 40-percent of all robberies in major U.S. cities, accounting for 27,000 thefts.

A mobile executive must realize that mobile devices need the same, if not more, virus protection than desktops. With the consumer smartphone experience geared towards quick and easy access to personal information, a compromised business smartphone is like giving a cybercriminal complete access to critical company data.

Employees risk losing important company data via their mobile devices through the following means:

  • Connecting to unsecure wireless networks
  • Downloading and installing unapproved apps
  • Visiting possibly malicious websites
  • Leaving the mobile device unattended

These, along with accidental loss of the actual device, pose serious risks to the company’s data.

The stolen data can include incoming and outgoing calls and text messages, address book, and users’ location detected by GPS. Such malware can pave the way to a potential data breach. Rooter malware can take control of the device and its functions as soon as it’s installed. This grants cybercriminals remote access to affected devices. It also gives access to the company’s network once the device is connected to it.

If you depend on mobile devices to conduct business, consider the risk and plan accordingly including what to do when devices are lost, stolen, or damaged. And by all means, don’t make another call without mobile security software installed.

For a small business, Trend Micro™ Worry Free™ Business Security Services protects Android devices as well as PCs, Macs, and servers, so you only need one security solution defending your business.