Select a topic or year
ARMONK, NY - 19 Mar 2015: IBM (NYSE: IBM) Security and the Ponemon Institute today announced research unveiling an alarming state of mobile insecurity. The findings show nearly 40 percent of large companies, including many in the Fortune 500, aren’t taking the right precautions to secure the mobile apps they build for customers. The study also found organizations are poorly protecting their corporate and BYOD mobile devices against cyber-attacks – opening the door for hackers to easily access user, corporate and customer data.The number of mobile cyber-security attacks is continuing to grow. At any given time, malicious code is infecting more than 11.6 million mobile devices1. The Ponemon Institute and IBM Security study, which researched security practices in over 400 large organizations, found that the average company tests less than half of the mobile apps they build. Also, 33 percent of companies never test their apps - creating a plethora of entry points to tap into business data via unsecured devices. While these numbers may seem shocking, they aren’t surprising when considering that a full 50 percent of these organizations were found to devote zero budget whatsoever towards mobile security.
“Building security into mobile apps is not top of mind for companies, giving hackers the opportunity to easily reverse engineer apps, jailbreak mobile devices and tap into confidential data,” said Caleb Barlow, Vice President of Mobile Management and Security at IBM. “Industries need to think about security at the same level on which highly efficient, collaborative cyber criminals are planning attacks. To help companies adopt smart mobile strategies, we've tapped the deep security expertise of IBM Security Trusteer, bringing what we've learned from protecting the most sensitive data of complex organizations - such as top global banks - and applying it to mobile.”
Hackers are now taking advantage of the popularity of insecure mobile apps, public Wi-Fi networks, and more to break into the highly valuable data often housed on BYOD and corporate mobile devices. Further, they’re also tapping mobile devices as an entry portal into an organization’s broader, highly confidential internal network.
The Ponemon Institute Unveils an Alarming State of Mobile Insecurity
The new study, conducted by the Ponemon Institute with IBM, has found major security flaws in the ways which most organizations build and deploy mobile apps for their customers. The organizations studied, of which 40 percent are Fortune 500 companies, operate in industries which work with highly sensitive data, including financial services, health and pharmaceutical, the public sector, entertainment and retail.
Among the organizations, each spent an average of $34 million annually on mobile app development. Of this tremendous budget, however, only 5.5 percent is currently being allocated to ensuring that mobile apps are secure against cyber-attacks before they are made available to users. A full 50 percent of companies devote no budget to security.
Tending to prioritize speed-to-market and user experience, the study found that many of these organizations scan their mobile apps for security vulnerabilities infrequently and much too late – if at all – leaving entry points which hackers are increasingly exploiting. These holes allow cyber-thieves to gain access to confidential business and personal data through BYOD or corporate mobile devices. According to IBM X-Force research, in 2014 alone, over 1 billion pieces of personally identifiable information (PII) were compromised as a result of cyber-attacks2.
During the creation of mobile apps, end user convenience is trumping end user security and privacy. According to the study, 65 percent of organizations state the security of their apps is often put at risk because of customer demand or need, and 77 percent cite “rush to release” pressures as a primary reason why mobile apps contain vulnerable code.
Of the companies that actually do scan for vulnerabilities before deploying apps to the market, only 15 percent of them test their apps as frequently as needed to be effective.
As BYOD Rises, Mobile Risks Increase
BYOD has become increasingly popular, if not a necessity, for organizations. The challenge arises when employees connect to unsecured networks or download insecure apps from untrusted sources, which leave the device vulnerable to malware. As uncovered by the Ponemon Institute’s findings, even apps from trusted organizations and available in traditional app stores can carry enormous risks.
According to the Ponemon study, though most employees are “heavy users of apps,” over half (55 percent) state their organization does not have a policy which defines the acceptable use of mobile apps in the workplace, and a large majority – 67 percent – of companies allow employees to download non-vetted apps to their work devices. Additionally, 55 percent of organizations say employees are permitted to use and download business apps on their personal devices (BYOD).
IBM MobileFirst Protect Adds Mobile Threat Management
To defend against cyber-criminals taking advantage of this immense opportunity, IBM has introduced a new mobile threat management (MTM) technology into its IBM MobileFirst Protect offering (formerly MaaS360). Using advanced cyber-threat and intelligence technology, IBM MobileFirst Protect Threat Management automatically detects suspicious activities on mobile endpoints, and stops malware the moment a device is breached. Delivered through the cloud and updated over-the-air, this technology enables organizations to be well-armed at all times against rapidly evolving and sophisticated threats and attacks.
IBM MobileFirst Protect Threat Management now provides automatic and highly intuitive protection against would-be hackers, who are increasingly targeting corporate and personal mobile devices (BYOD) used for work. Built by IBM Security, the offering’s new threat management technology integrates the flexible power of cloud, the comprehensive control of enterprise mobility management, and the most sophisticated defense tools yet created against malware and mobile fraud.
To try IBM MobileFirst Protect Threat Management for free, visit http://bit.ly/1DG5AtF.
About IBM Security
IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.
- Arxan Technologies, https://www.arxan.com/assets/1/7/Arxan_Application_Protection_with_IBM_Trusteer_-_Solution_Brief.pdf
- IBM X-Force Threat Intelligence Quarterly 1Q 2015 http://ibm.co/1wEMKV3
On average, a company test less than half of the mobile apps it builds, and 33% never test apps to ensure they're secure.
Despite a company spending an average of $34M on mobile app development, a full half of companies today devote $0 to making sure apps are secure.
In 2014, 1 billion personal data records were compromised by cyber-attacks, and at any given time, malware was affecting 11.6M mobile devices.
A full 40% of companies do not scan the code in their mobile apps for security vulnerabilities before putting them in the hands of users.
IBM and the Ponemon Institute Unveil an Alarming State of Mobile Insecurity (Credit: IBM)
|Banking and Financial Services
News about IBM solutions for the banking, investment banking, and insurance industries
|Healthcare and Life Sciences
News about IBM solutions for the healthcare and life sciences industries
|IBM Cloud Computing
Gain access to your applications from anywhere, at any time.
IBM solutions that help with security, risk management, and compliance
News about IBM retail solutions
Information Management, Lotus, Tivoli, Rational, WebSphere, Open standards, open source