Advanced Persistent Threats Now Hitting Mobile Devices
Smartphones, tablets and other mobile devices have become the target of malware and are even getting hit by highly targeted attacks known as "advanced persistent threats" that intended to steal sensitive data, according to a survey of 676 IT and security professionals.
Tue, December 17, 2013
Network World — Smartphones, tablets and other mobile devices have become the target of malware and are even getting hit by highly targeted attacks known as "advanced persistent threats" that intended to steal sensitive data, according to a survey of 676 IT and security professionals.
About two-thirds of the respondents said the mobile endpoints used in their organizations had been hit by malware and 40% also said these endpoints were the entry point for an APT-style attack aimed at specific individuals to gain access to corporate information. The Ponemon Institute's survey, titled "2014 State of Endpoint Risk", states that on average 63% of an organization's employees are now using mobile devices, with IT managers anticipating the number of devices that have to be actively managed will rise from 5,000 on average to 7,000 in the next three years.
"Just when many IT security practitioners were hoping to get their endpoint security risks under control, the exploding growth of mobility platforms and public cloud resources has turned these dreams into a security nightmare," the survey report asserts. The respondents perceive "mobile devices such as smartphones" to be the greatest potential IT security risk in the IT environment, more than PC desktops and laptops.
The survey, sponsored by Lumension, indicates that over half of the IT security experts learned of APT attacks against endpoints when they found anomalous exfiltration traffic on the network. About a quarter said the endpoint security technology they use alerted them to a possible breach and 21% were notified by law enforcement directly. APT attacks often commence with phishing e-mails to employees, Web-based click jacking, fraudulently signed code or digital certificates, they said.
+ Also on Network World: Point-of-sale malware infections on the rise A +
As far as the applications considered to have the highest IT risk, the top three choices were: Adobe; Google Docs; and Microsoft OS/applications.
Just over half of the survey's respondents say they have a "Bring Your Own Device" (BYOD) plan that lets employees use their own mobile devices for work purposes, and slightly over half of them are relying on "voluntarily installing the endpoint protection agent" for BYOD.
The survey also asked about perceived risks associated with third-party cloud services, and 54% of the respondents said their organization has a "centralized cloud security policy," up from 40% that did the year before.
Having to focus more on endpoint security is putting pressure on IT security budgets, according to the report, with only 44% expecting their overall IT security budgets to increase in 2014.
The types of technologies the survey's respondent expect to invest in over the next year include application control, data-loss prevention, mobile device management (MDM), device control and "big data analytics." The most important capabilities considered for MDM by the respondents are malware detection and prevention, provisioning and access management.
Ellen Messmer is senior editor at Network World, an IDG website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail: firstname.lastname@example.org
Read more about wide area network in Network World's Wide Area Network section.