Traditional cybersecurity strategies have always focused on protecting fixed terminals from cyber threats. What many users don’t realize is that mobile devices are now also heavily on the list of endpoints and protecting them differs significantly compared to protecting desktops and laptops. Although mobile devices face similar threats to desktop computers, the approach to protecting them is different. According to a survey, 1 in 50 business users are phishing through their mobile device, and 87% of mobile phishing attacks occur outside of email. Even though mobile operating systems are more resilient, they are increasingly targeted by cyber attackers as iOS, Android, and Chrome OS devices contain a large amount of sensitive and personal data. By the end of 2023, more than 50% of companies will have replaced older antivirus products with EPP (Endpoint Protection Platform) and EDR solutions that facilitate prevention with detection and response. This is where Lookout Mobile Endpoint Security helps address ever-evolving mobile security requirements.
“The freedom of accessibility provided by mobile devices comes with risks. It’s hard to trust any device while we continue to work outside the reach of legacy perimeter security. Mobile users require access from anywhere while ensuring their sensitive data is protected. Lookout, a cloud-integrated endpoint security company, also offers mobile endpoint security. Lookout Mobile Endpoint Security (MES) is designed to meet the mobile security needs of hundreds of thousands of endpoints. The mobile security market is all about partnerships, integrations and ecosystems,” he said. DR Goyal, Vice President of Technology at RAH Infotech.
A common attack vector uses mobile malware that can include spyware, banking Trojans, and rootkits. Malware can be delivered over any of the cellular, Wi-Fi, and Bluetooth connections used by mobile devices. As employees increasingly use unmanaged personal smartphones and tablets for work, mobile device management (MDM) cannot provide complete coverage. Traditional vulnerability management cannot fill this gap as it relies on devices connecting to the office or network in public places rather than home Wi-Fi or cellular networks. Mobile Endpoint Security through its cybersecurity capabilities prevents users from downloading or accessing unauthorized or insecure applications. It uses encryption to prevent data loss and enables organizations to quickly detect malware and other security threats. Lookout Mobile Endpoint Security supports an AI-powered Security Graph feature that protects businesses from known and unknown threats. When a threat is detected, it provides step-by-step instructions to investigate the problem and fix it. With a mobile endpoint security system like Lookout, organizations can also benefit from tools like detection and response and endpoint monitoring, which can identify and block more advanced security threats.
“In India, we’ve seen that organizations often have strong security solutions on their desktops, servers and laptops, but lack the same protection for mobile devices. Some organizations have invested in mobile device management (MDM) for device authentication and administration. However, these solutions do not provide protection against the most threatening issues such as mobile phishing attacks, network-based attacks and malware,” said Surojit Dasgupta, Country Manager, India and SAARC for Lookout. “Today, nearly 85% of mobile phishing attacks reach the victim outside of email. Attackers use social networks, SMS, third-party messaging apps, games, and even dating apps to phishing their victims. Protecting iOS, Android, and ChromeOS devices is imperative to protecting company data, as employees use these devices for personal and business purposes, exposing data to additional risk. Protecting these devices from phishing attacks and malicious apps will mitigate the risk of attackers gaining unauthorized access to your most valuable data.”
To be effective at stopping data breaches, security teams need comprehensive data for mobile devices similar to what they have for servers, desktops, and laptops. Mobile devices have become a major endpoint used by employees, from executives to C-Suites, but the focus from an endpoint security perspective has largely remained on desktops and laptops. It is critical that employees remain vigilant, use security best practices, and do not underestimate the value and sensitivity of data shared between mobile devices.