infographic - 2013 mobile security analysis

1

Click here to load reader

Upload: iscan-online-inc

Post on 22-Jun-2015

659 views

Category:

Technology


1 download

DESCRIPTION

The iScan Online mobile security analysis provides visualization of the vulnerability landscape pertaining to Android and Apple iOS smartphones and tablets. This report is intended to provide meaningful metrics to organizations who need to assess mobile vulnerabilities and protect confidential PII data.

TRANSCRIPT

Page 1: Infographic - 2013 Mobile Security Analysis

Mobile Devices 5% of smartphones were lost or stolen in 2013.

The iScan Online mobile security analysis provides visualization of the security landscape for Android and Apple iOS smartphones and tablets. This report is intended to provide meaningful metrics about vulnerabilities and threat vectors to organizations who allow BYOD and mobile workers.

MOBILE SECURITY SCANNING Today there are a wide array of smartphones, tablets and laptops connecting to your network. IT Departments are quickly prioritizing mobile vulnerability scanning and remediation efforts to identify the mobile threat quadrant listed above.

CONFIDENTIAL DATA ‘PII’ Credit Cards, Social Security and Drivers License numbers

CONFIGS Passwords, Bluetooth,

Encryption, Jailbroken/Root, 3rd

Party App Stores

APPLICATIONS Browsers, Gaming, Productivity, Social, Banking, Payment Processing

OPERATING SYSTEM

Master Key, Kernel Driver, Cryptography

Architecture

25%

25% 25%

25%

Operating Systems 53% of Android & Apple iOS devices scanned, could have been updated to prevent unauthorized access to data and applications.

53%

Applications 98% of the devices scanned were running vulnerable web browsers and apps. Adobe, Trip Advisor, Firefox & Wordpress were the most common vulnerable apps.

98%

MOBILE VULNERABILITIES Mobile vulnerabilities are on the rise. 365% increase in

mobile vulnerabilities discovered since 2010.

423

268

155

91

2013201220112010

Credit Card Data On average, 1 out of 11 smartphones store unprotected credit card data facilitated via cloud syncing.

Configurations 94% of devices failed 3 or more security settings. 47% had no onscreen password with 96% of encryption disabled

Confidential Data Unprotected credit card data was detected on 10% of devices scanned. Commonly found in SMS Messages, Contacts & documents on SD Cards

94% 10%

ISCAN PREDICTS The mobile threat quadrant in conjunction with the

adoption of mobility and cloud syncing technologies will cause Mobile Data Breaches to

become a top headline in 201470% 50

2013 MOBILE SECURITY ANALYSIS

Scan Anyone, Anytime, Anywhere www.iscanonline.com

ISCAN ONLINE MOBILE THREAT QUADRANT