LATEST INTELLIGENCE
RISE IN MOBILE PHISHING CREDENTIAL THEFT TARGETING U . S . PUBLIC SECTOR
PRESENTED BY
Download whitepaper here Executive summary
Mobile devices have unlocked previously untapped potential for your organization , enabling employees to work however and from wherever they ’ re the most productive . These modern endpoints , alongside cloud applications , now provide the same access to your sensitive data and confidential information as traditional computer endpoints . As a result , cyberattackers have built strategies to target both mobile devices and desktops to ensure they find vulnerable entry points into your infrastructure .
A single successful phishing or ransomware attack can result in intruders gaining access to nearly any category of a government agency or department ’ s data . While mobile and cloud apps have helped your organization remain productive while employees telework , they also significantly increase the risk of successful attacks .
A challenge to securing mobile devices is that the traditional approach to endpoint security solutions does not work for modern operating systems . iOS , Android , and Chrome OS devices operate differently and present a unique attack surface for threat actors seeking to compromise all levels of government security . Mobile Device Management ( MDM ) provides basic security capabilities , such as pushing software updates , but lacks the continuous monitoring and protection capabilities to secure your organization against phishing , malware , and device compromises .
Our methodology
To understand the challenges facing U . S . government agencies , Lookout analyzed data specific to our federal , state , and local customers from the Lookout Security Graph . The graph , which includes telemetry data from analysis of more than 200 million devices
20 INTELLIGENTCIO APAC www . intelligentcio . com