Mobile Security Threats Grow with Mobile Device Penetration

Posted on July 01, 2014

Every year, tech venture capital leader Kleiner Perkins Caulfield Byers (KPCB) publishes a report on Internet trends. And every year that report serves as a snapshot that developers, investors and CIOs use to help them plan ahead and check their understanding of important trends.

This year's report was presented by KPCB research analyst Mary Meeker at the end of May during the Code Conference. The report contains a number of important data points for IT managers, including:

As the number of Internet and mobile users continues to grow, more and more criminals are actively targeting them in search of data that can be stolen and turned into cash. KPCB reports that there were more than 300 active threat groups of Internet criminals targeting online users. That's an increase of more than 400% since 2011, Meeker wrote, according to security firm Mandiant's tracking.


It takes less than 15 minutes for one of these active threat groups to compromise a vulnerable system once it's connected to the Internet, and more than 95% of data networks have been compromised in some way during the last year, Meeker said in her presentation at the Code Conference.

Attacks Targeted at Mobile Platforms Increasing

"Countries like the US, Japan, Germany, the U.K., Canada, France and Korea with more than 75% of its population on the Internet are the most vulnerable," Meeker said, although countries with more than 45% user penetration are also at high risk of attacks targeted at mobile devices.


Most of these vulnerable countries also have a high smartphone penetration of more than 50%, she added, making them especially vulnerable to the increasing number of attacks targeted at mobile platforms. Countries with the largest smartphone penetration include the UAE (160%), Saudi Arabia (110%), Sweden (94%), Australia (85%), Korea (79%), Japan (78%), U.K. (68%) and U.S. (59%).

KPCB isn't the only firm sounding the alarm about mobile attacks. Security giant Symantecreported this spring that 38% of mobile users had experienced mobile cybercrime in the previous 12 months, but the number of targeted attacks on mobile platforms is up almost 91%. Juniper Research reports that 71% of IT managers say that endpoint attacks targeted at mobile devices are difficult to stop, and that only half of all devices in use through BYOD policies have any kind of EMM or mobile security solution installed. Juniper also reports that:

Even the Department of Homeland Security and the FBI have warned of attacks targeted at specific mobile operating systems, and encouraged federal contractors to take steps to improve security on mobile devices.

What the Data Means for IT

Jared Hansen, CEO of mobile security leader Breezy, says that nothing in the recent reports is likely to deter companies from allowing BYOD. "It's far too late to even attempt to stop most employees from bringing their mobile device into the workplace," he says. But the continuing growth in personally-owned mobile devices in the workplace means that organizations have to get serious about enterprise mobility management (EMM) in order to protect themselves from attacks that begin on mobile devices.

"The data couldn't be clearer," Hansen says. "There is a direct correlation between the number of connected mobile devices and the number of attacks. It's why we're seeing more and more Breezy customers adopt our secure mobile printing solution as part of their overall EMM strategy, rather than as a point solution."

Breezy partners with leading enterprise mobility management (EMM) companies to ensure mobile access to critical enterprise information without compromising security. Breezy's secure integration with these management platforms ensures that customers can access and print content from any device, without additional security risks. Breezy is fully integrated with leading EMM solutions from AirWatch, AppSense Mobile Now, Aruba, Citrix, Good, IBM/Fiberlink MaaS360, MobileIron and Mocana.  For more information about how Breezy can work with an EMM solution to protect your data, download a datasheet or watch a video now.

Easy to deploy and manage

Customers report that Breezy installations are among the easiest they’ve ever seen for an enterprise product.