Products
Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keylogger
Keystrokes recording software. Keylogger free trial
Hoverwatch
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

Study: Mobility against Security

21 March 2012, by — admin ()

According to a research called “The Impact of Mobile Devices on Information Security” published by Check Point® Software Technologies Ltd., the number of mobile devices connected to corporate networks doubled in 2010-2011. Half of these devices contain confidential information.

The management of 70% of the surveyed companies are confident that it is the use of mobile devices that results in the increased number of data leaks. This mostly happens when devices containing corporate emails (80% of cases), client databases (around 50%) and corporate passwords (around 40%) get lost or stolen.

Corporate users are actively embracing mobile devices and services, thus creating a lot of problems for IT experts responsible for the security of corporate data. Modern standards do not cover new security threads, and yet it’s not reasonable to completely stop using mobile devices, since they give users a number of advantages that boost their performance and provide them with quick and convenient mobile access to corporate resources.

Check Point report highlights:

  • In 94% of companies, the number of mobile devices connected to corporate networks has increased.
  • In 78% of companies, their number has more than doubled over the past two years.
  • The most popular mobile platforms used in corporate networks are:
    1. Apple (30%)
    2. BlackBerry (29%)
    3. Android (21%)
  • 43% of companies believe that Android-based devices pose a serious threat to their information security.
  • The key threats undermining information security are:
    1. Lack of knowledge in the information security field among corporate users (over 70%).
    2. Use of mobile devices for web browsing (61%)
    3. Use of unprotected wireless connections (59%)
    4. Device loss of theft (58%)
    5. Downloading of malicious software to mobile devices (57%).

 

New online service from Refog. Track any device online. Just install the cell phone tracking. And Information from your phones and computers will reflect in your online Hoverwatch account.


Tags: , , , ,