{"id":90869,"date":"2020-04-07T09:00:13","date_gmt":"2020-04-07T16:00:13","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90869"},"modified":"2023-05-15T23:06:41","modified_gmt":"2023-05-16T06:06:41","slug":"mobile-security-60-percent-problem","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/07\/mobile-security-60-percent-problem\/","title":{"rendered":"Mobile security\u2014the 60 percent problem"},"content":{"rendered":"

This blog post is part of the Microsoft Intelligence Security Association (MISA) guest blog series<\/a>. To learn more about MISA, visit the MISA webpage<\/a>.<\/em><\/p>\n

Off the top of your head, what percentage of endpoints in your organization are currently protected?<\/p>\n

Something in the 98 percent+ range?<\/p>\n

Most enterprises would say having fewer than 2 percent of endpoint devices lacking adequate security would be considered good given the various changes, updates, etc. However, enterprises have traditionally focused security and compliance efforts on traditional computing devices (for example, servers, desktops, and laptops), which represent just 40 percent of the relevant endpoints. The remaining 60 percent of endpoints are mobile devices and are woefully under-protected. That\u2019s a problem.<\/p>\n

Mobile security is more important than ever<\/h3>\n

Mobile devices, both corporate-owned and bring your own device (BYOD), are now the dominant productivity platform in any enterprise organization, with more than 80 percent of daily work performed on a mobile device. These devices operate extensively outside of corporate firewalls, in the hands of users who may not prioritize precautions like vetting Wi-Fi networks or keeping their devices patched and updated. Mobile often represents a wandering corporate data repository.<\/p>\n

These factors combine to cause headaches for security teams because, in short, mobile security has a significant gap in most organizations\u2019 endpoint protection strategies.<\/p>\n

The lack of protection for (and visibility into) these endpoints introduces significant risk and compliance concerns that show no sign of slowing down. Here are some statistics from Zimperium\u2019s State of Enterprise Mobile Security Report, 2019<\/a>, which contains data from more than 45 million anonymized endpoints<\/strong> from enterprises in a variety of industries and both local and national government agencies from around the world:<\/p>\n