10.05.2016 Views

Q4 Mobile Security and Risk Review

security-report-Q415-v1.2-EN

security-report-Q415-v1.2-EN

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Along with the change in mobile operating system architecture, there has been a<br />

fundamental change in user behavior. <strong>Mobile</strong> computing has been supported by an<br />

emergence of cloud <strong>and</strong> cloud-oriented apps that directly impact user behaviors. In the<br />

pre-cloud era, corporate data was generally maintained exclusively in access-controlled<br />

files behind a corporate firewall. In the post-cloud <strong>and</strong> post-social media era (a.k.a,<br />

the millennium era), however, end users rarely think twice about sharing personal<br />

or corporate data via cloud-based services. This poses a real challenge to enterprise<br />

administrators who must prevent <strong>and</strong>/or mitigate the risk of data leakage in order to<br />

protect trade secrets <strong>and</strong> comply with the various laws, regulations, <strong>and</strong> st<strong>and</strong>ards that<br />

apply to the h<strong>and</strong>ling of sensitive data.<br />

MISL tracks ongoing <strong>and</strong> emerging threats across the mobile l<strong>and</strong>scape. These threats<br />

are categorized by their method of attack through 1) the mobile device, 2) mobile apps,<br />

<strong>and</strong> 3) corporate networks (including cloud). The following diagram outlines these<br />

mobile threat vectors.<br />

Malware <strong>and</strong> <strong>Risk</strong>y Apps<br />

• PII & PHI exposures<br />

• Data exfiltration<br />

• Stolen app credentials<br />

Device<br />

• Device vulnerabilities<br />

• Patching not up-to-date<br />

• Out-of-compliance<br />

• User jailbreaking/rooting<br />

• Custom ROMs, ADB, USB<br />

DEVICE<br />

APPS<br />

USER<br />

User Data Leakage<br />

• Copy/paste<br />

• Sreenshot<br />

• Open-in<br />

NETWORKS<br />

Personal Cloud Storage & Sync<br />

• Backup sync<br />

• Upload to personal cloud<br />

Unprotected Networks<br />

• Rogue access points<br />

• Open WiFi<br />

• Man-in-the-middle attacks<br />

<strong>Mobile</strong> Threat Vectors<br />

4 <strong>Q4</strong> <strong>Mobile</strong> <strong>Security</strong> <strong>and</strong> <strong>Risk</strong> <strong>Review</strong>, October 1 - December 31, 2015

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!