Be the first to hear the mobile news. Enter your email to join.

[Infographic] The Haunting Reality of Mobile Security

  • Blakely Thomas-Aguilar By

It’s happening all over the world: that thrill of terror, that masked villain, that thief walking silently through your halls. It’s not your office Halloween party. It’s your employees’ mobile devices—and they’re everywhere.

In this new infographic, discover the haunting reality of mobile security in today’s increasingly digital workforce. From mobile breaches to hacks and security tests to millions of dollars lost, this dark threat is worse than any bump in the night—and anyone anywhere could fall victim.

Mobile Security Infographic_Haunting Reality_AirWatch

The Haunting Reality of Mobile Security Infographic Sources

  • 1,023,108,267 records breached in 2014. (Breach Level Index)
  • 5.2 million lost or stolen smartphones in the U.S. in 2014. (Consumer Reports)
  • 44% of web attacks were launched from the U.S. and Germany. (Kaspersky Lab)
  • #1 weakest security link for businesses: mobile devices. (CyberEdge Group)
  • 1-in-5 Android users experienced a mobile threat in 2014. (Kaspersky Lab)
  • Average U.S. Enterprise Cost of Cybercrime by Industry: (Ponemon Institute)
    • $8.6 million for U.S. retail stores
    • $12.7 million in communications
    • $14.5 million in technology
    • $20.8 million in financial services
  • 75% or more mobile apps would fail basic security tests. (Gartner)
  • 9X more mobile banking Trojan attacks in 2014. (Kaspersky Lab)
  • 56% of enterprises admit to being unlikely they will detect a sophisticated threat. (EY)
  • 37% admitted that their enterprise has no real-time visibility on cyberattacks. (EY)

Need to secure your mobile deployment, think through a BYOD program or work to gain back your end users’ privacy trust? Check out these great (and free!) resources:

Blakely Thomas-Aguilar

Blakely Thomas-Aguilar

Blakely is a brand journalist for VMware AirWatch by day, sci-fi/fantasy book-aholic (and mom of 3!) by night.

Leave a Reply

Your email address will not be published. Required fields are marked *


Blog By Region

Blog By Category: