infographic - 2013 mobile security analysis
DESCRIPTION
The iScan Online mobile security analysis provides visualization of the vulnerability landscape pertaining to Android and Apple iOS smartphones and tablets. This report is intended to provide meaningful metrics to organizations who need to assess mobile vulnerabilities and protect confidential PII data.TRANSCRIPT
Mobile Devices 5% of smartphones were lost or stolen in 2013.
The iScan Online mobile security analysis provides visualization of the security landscape for Android and Apple iOS smartphones and tablets. This report is intended to provide meaningful metrics about vulnerabilities and threat vectors to organizations who allow BYOD and mobile workers.
MOBILE SECURITY SCANNING Today there are a wide array of smartphones, tablets and laptops connecting to your network. IT Departments are quickly prioritizing mobile vulnerability scanning and remediation efforts to identify the mobile threat quadrant listed above.
CONFIDENTIAL DATA ‘PII’ Credit Cards, Social Security and Drivers License numbers
CONFIGS Passwords, Bluetooth,
Encryption, Jailbroken/Root, 3rd
Party App Stores
APPLICATIONS Browsers, Gaming, Productivity, Social, Banking, Payment Processing
OPERATING SYSTEM
Master Key, Kernel Driver, Cryptography
Architecture
25%
25% 25%
25%
Operating Systems 53% of Android & Apple iOS devices scanned, could have been updated to prevent unauthorized access to data and applications.
53%
Applications 98% of the devices scanned were running vulnerable web browsers and apps. Adobe, Trip Advisor, Firefox & Wordpress were the most common vulnerable apps.
98%
MOBILE VULNERABILITIES Mobile vulnerabilities are on the rise. 365% increase in
mobile vulnerabilities discovered since 2010.
423
268
155
91
2013201220112010
Credit Card Data On average, 1 out of 11 smartphones store unprotected credit card data facilitated via cloud syncing.
Configurations 94% of devices failed 3 or more security settings. 47% had no onscreen password with 96% of encryption disabled
Confidential Data Unprotected credit card data was detected on 10% of devices scanned. Commonly found in SMS Messages, Contacts & documents on SD Cards
94% 10%
ISCAN PREDICTS The mobile threat quadrant in conjunction with the
adoption of mobility and cloud syncing technologies will cause Mobile Data Breaches to
become a top headline in 201470% 50
2013 MOBILE SECURITY ANALYSIS
Scan Anyone, Anytime, Anywhere www.iscanonline.com
ISCAN ONLINE MOBILE THREAT QUADRANT