IBM Sponsored Study Finds Mobile App Developers Not Investing in Security
“Building security into mobile apps is not top of mind for companies, giving hackers the opportunity to easily reverse engineer apps, jailbreak mobile devices and tap into confidential data,” said Caleb Barlow, Vice President of Mobile Management and Security at IBM. “Industries need to think about security at the same level on which highly efficient, collaborative cyber criminals are planning attacks. To help companies adopt smart mobile strategies, we've tapped the deep security expertise of IBM Security Trusteer, bringing what we've learned from protecting the most sensitive data of complex organizations - such as top global banks - and applying it to mobile.”
Hackers are now taking advantage of the popularity of insecure mobile apps, public Wi-Fi networks, and more to break into the highly valuable data often housed on BYOD and corporate mobile devices. Further, they’re also tapping mobile devices as an entry portal into an organization’s broader, highly confidential internal network.
The Ponemon Institute Unveils an Alarming State of Mobile Insecurity
The new study, conducted by the Ponemon Institute with IBM, has found major security flaws in the ways which most organizations build and deploy mobile apps for their customers. The organizations studied, of which 40 percent are Fortune 500 companies, operate in industries which work with highly sensitive data, including financial services, health and pharmaceutical, the public sector, entertainment and retail.
Among the organizations, each spent an average of \\$34 million annually on mobile app development. Of this tremendous budget, however, only 5.5 percent is currently being allocated to ensuring that mobile apps are secure against cyber-attacks before they are made available to users. A full 50 percent of companies devote no budget to security.
Tending to prioritize speed-to-market and user experience, the study found that many of these organizations scan their mobile apps for security vulnerabilities infrequently and much too late – if at all – leaving entry points which hackers are increasingly exploiting. These holes allow cyber-thieves to gain access to confidential business and personal data through BYOD or corporate mobile devices. According to IBM X-Force research, in 2014 alone, over 1 billion pieces of personally identifiable information (PII) were compromised as a result of cyber-attacks2.
During the creation of mobile apps, end user convenience is trumping end user security and privacy. According to the study, 65 percent of organizations state the security of their apps is often put at risk because of customer demand or need, and 77 percent cite “rush to release” pressures as a primary reason why mobile apps contain vulnerable code.
Of the companies that actually do scan for vulnerabilities before deploying apps to the market, only 15 percent of them test their apps as frequently as needed to be effective.
As BYOD Rises, Mobile Risks Increase
BYOD has become increasingly popular, if not a necessity, for organizations. The challenge arises when employees connect to unsecured networks or download insecure apps from untrusted sources, which leave the device vulnerable to malware. As uncovered by the Ponemon Institute’s findings, even apps from trusted organizations and available in traditional app stores can carry enormous risks.
According to the Ponemon study, though most employees are “heavy users of apps,” over half (55 percent) state their organization does not have a policy which defines the acceptable use of mobile apps in the workplace, and a large majority – 67 percent – of companies allow employees to download non-vetted apps to their work devices. Additionally, 55 percent of organizations say employees are permitted to use and download business apps on their personal devices (BYOD).
IBM MobileFirst Protect Adds Mobile Threat Management
To defend against cyber-criminals taking advantage of this immense opportunity, IBM has introduced a new mobile threat management (MTM) technology into its IBM MobileFirst Protect offering (formerly MaaS360). Using advanced cyber-threat and intelligence technology, IBM MobileFirst Protect Threat Management automatically detects suspicious activities on mobile endpoints, and stops malware the moment a device is breached. Delivered through the cloud and updated over-the-air, this technology enables organizations to be well-armed at all times against rapidly evolving and sophisticated threats and attacks.
IBM MobileFirst Protect Threat Management now provides automatic and highly intuitive protection against would-be hackers, who are increasingly targeting corporate and personal mobile devices (BYOD) used for work. Built by IBM Security, the offering’s new threat management technology integrates the flexible power of cloud, the comprehensive control of enterprise mobility management, and the most sophisticated defense tools yet created against malware and mobile fraud.
To try IBM MobileFirst Protect Threat Management for free, visit http://bit.ly/1DG5AtF.
To download the Ponemon Institute’s report, “The State of Mobile Application Insecurity” go to http://ibm.co/1F595xW. For more information, visit http://www.ibm.com/security.
About IBM Security
IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.
- Arxan Technologies, https://www.arxan.com/assets/1/7/Arxan_Application_Protection_with_IBM_Trusteer_-_Solution_Brief.pdf
- IBM X-Force Threat Intelligence Quarterly 1Q 2015 http://ibm.co/1wEMKV3
Комментарии