Understanding the Spectrum of Mobile Risk

New research is changing the way CISOs perceive the risks to critical data from the mobile ecosystem — and how they should secure it.

Mobile Risk Is a Spectrum

How to think about the risk to data from the mobile ecosystem

Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it.

Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.

Download Report

Likelyhood + Impact

Protecting Your Organization

The next steps for extending your security program to mobile start with thinking through each element of the Mobile Risk Matrix and developing a strategy to manage that risk in the context of your organization.

The example to the left shows a global 2000 bank at high risk from network threats over rogue Wi-Fi connections encountered by traveling employees, and by auto-rooting Android malware app threats.

Read the case study to see how this global 2000 bank got visibility into their risks then mitigated them with Lookout Mobile Endpoint Security.

Read Case Study

Users on mobile are three times as likely to enter their credentials in a phishing page compared with desktop users.

Spectrum of Risk Report

End-users and mobile risk

Many mobile risks require user interaction to execute, and the most likely interaction that can lead to a breach is a socially-engineered phishing attack.

Phishing on mobile has shown to be more effective than on the PC because traffic typically does not flow through a secure network gateway (as enterprise PC traffic often does) and mobile browsers obscure website URLs both by hiding the address bar while a user is scrolling and limiting the number of characters displayed in the address bar by the width of the screen.

A key insight is that mobile devices can increase the chance of success for social engineering and phishing attacks across a number of the mobile risks described on this page.

Read Case Study

Understanding the full range of risks to enterprise data from mobility

The Mobile Risk Matrix, developed by Lookout, helps organizations understand the Spectrum of Mobile Risk, and the prevalence and impact of mobile threats and vulnerabilities.

Read this exclusive research to gain insights into mobile risk from Lookout's uniquely massive global threat intelligence data.

Download Report
mobile risk assessment

Learn where your mobile risks and potential compliance infringements are

Complete this online mobile risk assessment to get insight into your current level of mobile risk based on your mobility policies and existing controls such as EMM. This assessment is based on a framework called the Mobile Risk Matrix, outlining risk across threats, software vulnerabilities, and risky behaviors & configurations for each of the attack vectors on mobile devices.

Get a custom assessment of GDPR and business risks to personal data by answering 20 questions about the state of mobility in your organization.

Download Report
Mobile Risk Assessment

Mobile security insights

Webinar: The Spectrum of Mobile Risk

The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was...

Watch Now

Gartner insights: four mobile security recommendations for CISOs

In the past year, Gartner has provided guidance on the differences between Enterprise Mobility...

Download Summary

Global 2000 Case Study

Read this case study to learn how a Forbes Global 2000 bank achieved secure mobility with Lookout....

Read Case Study

Request a demo and see what Lookout can do for you.