The BYOD revolution. You've heard of it, you know it's coming, some believe it's already here. Is it inevitable? Will it change the way we do business? No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security!


Add this Infographic to Your Website for FREE!

Small Version

Large Version

Infographic by Veracode Application Security

Simple things you can do to protect yourself and your organization from today’s mobile computing threats

  • Joe Worker says, "BYOD is a business trend that’s here to stay"
  • Joe IT says, "Criminals may not have physical access to your device but can still crack it’s sensitive and confidential data"

Work Benefits of Mobile Devices

  • Boost productivity with access to apps, email, and the internet
  • Allow us to work on the move
  • Store large amounts of data and provide a gateway to the rest of the organization

Mobile Devices are Inherently Insecure

  • Devices can be lost of stolen
  • Information can be stolen over wireless networks
  • Mobile malware
  • IT specialists are worried about insecure devices
  • Device users are often uneducated about risks and how to secure devices

We Love Our Gadgets

  • 42% Smartphone Market Growth from 2010 to 2011
  • 40 Million Tablets sold in less than 2 years
  • 1 Billion Mobile devices activated by the end of 2012
  • 3.1 Billion estimated number of mobile broadband subscribers by 2015
  • 40 billion estimation of how many apps have been downloaded from the Apple iTunes stroe and Android Marketplace

Recent Mobile Device Breaches

  • Employees believe that nobody attacks mobile phones. In reality, smartphones are easy targets for hackers.
  • 51% of organizations have had data loss due to insecure devices
  • 59% or organizations experienced an increase in malware infection due to insecure mobile devices
  • 174 million records were stolen in 855 data breaches
  • Cost of $194 per record
  • Average cost of a breach is $5.5M

Malicious Apps

  • The security controls that the app marketplaces have in place to vet the safety of their offerings are woefully inadequate
  • Some apps may have:
    • Hidden spyware
    • Malware
    • Phishing screens
    • Background processes

10 Tips to secure your mobile gadgets

  1. Use password protected controls
  2. Control wireless network and service connectivity
  3. Control application access and permissions
  4. Keep your OS and firmware current
  5. Back up your data
  6. Wipe devices data automatically if lost or stolen
  7. Never store personal financial data on your device
  8. Beware of free apps
  9. Try mobile antivirus software of scanning tools
  10. Use mobile device management (mdm) software if recommended by it

Veracode Security Solutions

Vulnerability Assessment Tools

Web Vulnerability Scanner

Apple iOS Security

Website Security

Mobile Phone Security

Online Internet Security

Facebook Security Issues

SDLC Phases

SQL Injection Attack

Android Application Security


Neil is a Marketing Technologist working on the Content and Corporate teams at Veracode. He currently focuses on Developer Awareness through strategic content creation. In his spare time you'll find him doting over his lovely wife and daughter. He is a Co-Owner of CrossFit Amoskeag in Bedford NH, his favorite topic is artificial intelligence, and his favorite food is pepperoni pizza.

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.




contact menu