The rising use of personal devices for business purposes expands the range of device types and platforms within the corporate network
By KEVIN WONG / Pic By TMR File
ABOUT 38% of enterprises around the world have experienced exploits or loss through mobile devices as the main attack route.
According to a 2017 survey by Kaspersky Lab, malicious software, websites and phishing attacks aimed at mobile devices continue to thrive, while mobile devices’ capabilities are still developing.
As such, Kaspersky Lab South-East Asia GM Yeo Siang Tiong said users who are not protected by any cyber-security software must be wary when using their mobile devices, as well as smartphones.
At the moment, many people are using their smartphones without protection to conduct financial transaction.
Speaking to reporters at Kaspersky Lab’s Cyber Insight 2018 in Kuala Lumpur yesterday, Yeo said users should always have their devices protected before opting to use them for their financial transactions.
The survey stated that as an important productivity tool at home and at work, mobile devices are tempting targets for cybercriminals.
“At the same time, the rising use of personal devices for business purposes expands the range of device types and platforms within the corporate network. This creates additional challenges for information technology (IT) administrators trying to manage and control the IT infrastructure,” it stated.
The survey added that employees who are using their mobile devices for both work and personal use will increase the chance of IT security breach at the organisations they are working for.
Hackers who gain access to unsecured personal information on a mobile phone would then gain easy access to users’ corporate systems and business data, it noted.
Kaspersky Lab also said the average losses incurred by enterprises globally due to data loss and exploits through mobile devices is about US$1.7 million (RM7.04 million).
It stated that there is no safe platform as cyber-criminals have various methods to gain unauthorised access to mobile devices.
“Hackers may use infected applications, public WiFi networks with low security levels, phishing attacks and infected text messages,” it added.